Symmetric Block Cipher Algorithms Flashcards

1
Q

Feistel Function

A

Larger Block sizes increase security, Larger Key sizes increase security, and if the round function is secure, then more rounds increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Space

A

refers to the number of possible keys. For examples, DES uses a 56-bit key soit has a key space of 2^56. It is the set of possible keys for a given algorithm. Contrast this with the Caesar cipher, which had a key space of 26. With only 26 letters in the alphabet, there were only 26 possible keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Schedule

A

Refers to the generation of sub keys from a single key. In many ciphers, the encryption and decryption is done in rounds. Each round takes the algorithm’s key, alters it to some degree, then applies it to that round. In other words, in each round a slightly different key is used, but that key is derived from the original key. A key schedule is an algorithim that, given the key, calculates the subkeys for these rounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher (formal definition)

A

The algorithms(s) needed to encrypt and decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key (formal definition)

A

The random bits used in encrypting a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Algorithm (formal definition)

A

The mathematical process used to alter a message and read it unintelligible by any but the intended party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Horst Feistel

A

Invented the Feistel Function. Also known as the Feistel Network or Feistel cipher.

Splits the block of plain text data (often 64 bits) into two parts(traditionally termed L0 R0).

The round function is applied to 1 of the halves then the output is XOR’d with the other half

This process is repeated many times, and the main differences between cryptography algorithims is the exact nature of the round function F, AND the number of iterations it goes through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unbalanced Feistel Cipher

A

Variation of the Feistel Cipher where L0 and R0 are not of equal lengths. L0 might be 32 bits and R0 might be 64 bits.(this is used in the skipjack algorithim).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DES (Data Encryption Standard)

A

56-bit key applied to a 64 bit block cipher(note a 64 bit key is generated, 8 bits are used for error corrections).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

S-Box

A

means substitution box and is basically a look up table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3DES

A

It does DES three times with three different keys. K1, K2, AND K3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DESx

A

Variation of DES that uses a technique called Key Whitening, Just XOR a key with the text either before the round function, after the round function, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

AKA Rijndael block cipher. Was chosen as the replacement for DES in 2001.

3 Different key sizes 128, 192, 256. AKA AES 128, AES 192, AES 256.

Uses a Substitution-Permutation matrix. Operates on a 4x4 column-major matrix called the state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Joan Daeman and Vincent Rijmen.

A

Invented the AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish

A

Symmetric Block Cipher. Like DES it is a 16 bit round Feistel cipher working on 64 bit blocks AND has varying key sizes ranging from 32 bits to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bruce Schneier

A

Invented blowfish

17
Q

Serpent

A

Has a block size of 128 bits, can have keys of 128, 192, 256.

Uses a substitution-permutation network.

Uses 32 rounds using a block of 4 32-bit words.

18
Q

Twofish

A

Block size is 128 bits and key size is up to 256 bits. Uses the Feistel cipher.

19
Q

Skipjack

A

Developed by NSA and was designed for the clipper chip.(a chip with built in encryption)

The decryption key was to be kept in a key escrow in case, law enforcement need to derypt data without the owners coop.

Uses 80-bit key to encrypt or decrypt 64-bit blocks. Uses unbalanced Feistel network with 32 rounds.

20
Q

IDEA (International Data Encryption Algorithm)

A

64-bit blocks and 128-bit key.

21
Q

CAST

A

created by Carlisle Adams and Stafford Tavares. 2 Major versions CAST-128 and CAST-256.

22
Q

TEA (Tiny Encryption Algorithm)

A

Easy to use in code, uses a feistel cipher that uses 64 rounds.

23
Q

SHARK

A

Uses a 64-bit block with a 12-bit key and operates in 6 rounds.