Các D NG Mã Hóa - PH M Quang Vinh

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

MSSV: 22162057

Họ Tên: Phạm Quang Vinh

Office:

Office 2010 employed AES and a 128-bit key, but the number of SHA-1 conversions
doubled to 100,000.[4]

Office 2013 uses 128-bit AES, again with hash algorithm SHA-1 by default.[6] It
introduces SHA-512 hashes in the encryption algorithm, making brute-force and rainbow
table attacks slower.[citation needed]

Office 2016/2019 uses, by default, 256-bit AES, the SHA-2 hash algorithm, 16 bytes
of salt and CBC (cipher block chaining).[7

PDF:

PDF files may be encrypted with the obsolete, insecure RC4 algorithm or the more secure
AES algorithm. See also Weak Cryptography for a discussion. 40-bit encryption always
uses RC4. 128-bit can use either RC4 (the default for compatibility reasons) or, starting
with PDF 1.6, AES. 256-bit encryption always uses AES.

Archive:

Advanced Encryption Standard (AES) 128-bit encryption is the default encryption option.
For the highest level of data encryption, use 256-bit Advanced Encryption Standard (AES)
data encryption by specifying the encryptiontype option.

NTFS:

Windows XP (no service pack): DES-X (default), Triple DES (available)

Windows XP SP1 - Windows Server 2008: AES-256 symmetric (default), DES-X


(available), Triple DES (available)

BitLocker:

BitLocker uses Advanced Encryption Standard (AES) as its encryption algorithm with
configurable key lengths of 128 bits or 256 bits. The default encryption setting is AES-
128, but the options are configurable by using policy settings.

TrueCrypt:

Individual ciphers supported by TrueCrypt are AES, Serpent, and Twofish. Additionally,
five different combinations of cascaded algorithms are available: AES-Twofish, AES-
Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpen

VPN:

Ensure your VPN has sufficient encryption for your online activity. Many VPNs use AES-
256 encryption, which is military grade and secure.

SSH:
MSSV: 22162057
Họ Tên: Phạm Quang Vinh

Symmetric-key algorithms are used to encrypt the data and provide confidentiality. The
parameters and shared key that are used in the encryption process are established in the
earlier phases of the connection. The chosen algorithm encrypts the payload, the packet
length, the padding length, and the padding fields.

A range of different encryption algorithms are accepted in SSH, but for security purposes,
it is best to stick with AES. Keys should be a minimum of 128-bit, but larger keys are
preferred

IPsec:

IPSec uses asymmetric and symmetric encryption to provide speed and security during
data transfer. In asymmetric encryption, the encryption key is made public while the
decryption key is kept private.

You might also like