Cryptography Cheat Sheet
by ipsec via cheatography.com/163245/cs/34186/
Symmetric (Block) Asymmetric
Name Key Size(bits) Block Size(bits) Rounds Name Description Notes
DES 56 64 16 RSA Leverages prime Most popular,
3DES 56 64 16 # provides auth/encrypt,
1024-4096 key auth via digital signatures
AES 128,192,256 128 10,12,14
size
IDEA 128 64 8
1 round
Skipjack 80 64 32
ECC Leverages Provides auth/encrypt,
Blowfish 32-448 64 16 discrete faster than RSA,
Twofish 1-256 128 16 logarithm uses less resources
(like cell phones),
Camellia 128,192,256 128 18,24
auth via digital signatures
RC2 1-128 (40 min) 64 18
El Gamal Used in recent Extension of Diffie,
RC5 1-2048 32,64,128 1-255
versions of PGP similar protection as RSA/ECC,
RC6 Variable 32,64,128 20 usually the slowest
(128,192,256)
DSA Used to verify FIPS 186 Standard
XTEA 128 64 64 signatures,
used Key pair,
Symmetric (Stream) verified w/ public
Name Key Rounds Notes key
Size(bits) Knapsack Used for encrypt Considered insecure
RC4 1-2048 1 40 bit key min, Diffie No auth, Provides a method for key
SSL, Web, WiFi Hellman MITM proned exchange using a one-way
RCA 1-256 1-255 function.
FISH Lagged Fibonacci PRNG,
Block Cipher Modes (Symmetric)
Data XOR'd w/ key
PIKE FISH improvement to plaintext Name Description
vulnerabilities, ECB Electronic Most basic, weak, and unsecure. Each
most common stream Code block processed separately. No Salt or IV is
ChaCha 256 bit 3x faster than software, Book used and the same key will be used to encrypt
key, enabled AES and not sensitive to each block.
64 bit timing attacks CBC Cipher Minor step up from ECB.
nonce Block Added IV for the first block.
Chaining Results of encryption from the previous block
is input into to encryption process of the current
block.
By ipsec Not published yet. Sponsored by ApolloPad.com
cheatography.com/ipsec/ Last updated 16th September, 2022. Everyone has a novel in them. Finish
Page 1 of 3. Yours!
https://apollopad.com
Cryptography Cheat Sheet
by ipsec via cheatography.com/163245/cs/34186/
Block Cipher Modes (Symmetric) (cont) Cryptographic Hash
CFB Cipher Converts the block cipher into a self-sync‐ Name Hash Value (bits)
Feedback hronizing stream cipher. MD2 128
Current block takes output of the XOR ⊕
MD4 128
process vs from the cipher stage of the previous
MD5 128
block
(difference between CFB and OFB). MD6 1-512
OFB Output Converts the block cipher to a synchronous SHA-1 160
Feedback stream output. SHA-2 256,384,512
Current block takes output from cipher stage
SHA-3 Variable
vs from the output of the XOR process of the
SHA-256 256
previous block (diff between CFB and OFB).
The first stage takes the data blocks and X- SHA-512 512
ORs it with encrypted version of the IV value.
The output of the 1st stage encryption is then Historical Ciphers
feed into the next stage, and encrypted, with the Name Description
output being
Pigpen Mono- alphabetic substitution cipher that makes use of
X-OR’ed with the second block.
mapping plaintext characters to graphical characters
CTR Counter Converts the block cipher into a stream rather than to alphabetic ones. i.e. A=(pick a symbol), vs
Mode cipher. A=(pick a letter). Disadvantage: once the mapping is
Generates a counter value and a nonce, and known, it is difficult to keep the message secret.
encrypts this, in order to EX-OR with the plain
Rail Employs a method to scramble text by writing it in a
text block.
Code sequence across a number of rails.
Advantage of CTR is that each block is
BIFID Makes use of a grid and which maps the letters into
processed independent of the others, facilitating
numeric values.
ability to conduct parallel processing of blocks.
i.e., feedback from other stages to feed into the Playfair 5 × 5 matrix containing the alphabet less the letter J.
current one is not required. Cipher/decipher process consists of a set of rules
outlining use of column and row combinations.
Morse Encoding method, rather than a cipher, that works by
Code translating characters into sequences of dots (.) and
dashes (-)
By ipsec Not published yet. Sponsored by ApolloPad.com
cheatography.com/ipsec/ Last updated 16th September, 2022. Everyone has a novel in them. Finish
Page 2 of 3. Yours!
https://apollopad.com
Cryptography Cheat Sheet
by ipsec via cheatography.com/163245/cs/34186/
Historical Ciphers (cont)
Caesar Mono-alphabetic substitution cipher known as "shift"
cipher. Involves plaintext being replaced by a letter some
fixed number of positions down the alphabet. i.e., a
Caesar Cipher using a shift of +3 would mean a plaintext
letter A would result in a ciphertext letter D (a shift of
three positions to the right in the alphabet).
Vigenere Polyalphabetic cipher that involves using a different
mapping, based on a keyword, for each character of the
cipher. An advantage of this type of cipher is that the
same plaintext character is likely to be coded to different
mappings, depending on the position of the keyword,
making guessing more difficult.
One Cipher code mapping that is used only once. Advantage
Time is it is essentially unbreakable, disadvantage is it takes
Pad lots of work as you'd have to generate the pad to be
used, each time.
Four-s‐ Uses four 5 × 5 matrices arranged in a square, are
quare where each matrix contains 25 letters for encoding and
Cipher decoding operations.
Enigma Used a polyalphabetic substitution cipher, which did not
Machine repeat within a reasonable time period, along with a
secret key. For the cracking of the Enigma cipher, the
challenge was thus to determine both the algorithm used
and the key. Enigma’s main weakness, though, was that
none of the plain text letters could be ciphered as itself
By ipsec Not published yet. Sponsored by ApolloPad.com
cheatography.com/ipsec/ Last updated 16th September, 2022. Everyone has a novel in them. Finish
Page 3 of 3. Yours!
https://apollopad.com