6-3 Flashcards

1
Q

binary encryption does not work well for secure communications sinc ethe underlying _________ and _________ frequency remains

A

letter and word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the following websites offer more information about cryptography

A

coursera, udacity, cipher research labratories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this refers to the method where the same key is used to encrypt and decrypt the plain text

A

Symetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

developed by ibm in the early 70s, and made public in 1976.uses symetric key system. uses short keys and relies on complex procedures to secure information.

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the des algorithim is compluicated, data is divided into ___blocks. transposed by 16 rounds of encryption using a___ bit key

A

64 // 56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

des is a ______ with 16 rounds and a 48 bit round key for each round

A

feistel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

to generate the round keys the ___ bit key is split into 2 ___ bit halves and those halves are circularly shifted after each round by one or __ bits

A

56 // 28 // 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__________ a symmetric bloc cipher. that means a single key is used to encrypt and decrypt the message and works in blocks. it uses an average key length from 32 to 448 bitsdesigned in 1993 by bruce scheier. free of charge product

A

blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______operates on blocks of fixed length. normally 64 or 128 bit length. its applied to a block of data

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

takes the text as an outgoing stream. encrypting each bit as it encounters it. tend to be faster then block ciphers. generates a keystream

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

uses the rijndael algorithm. developed by 2 belgina researcherso joan daemon and vincent rijmen. 3 specific key sizes___, ___, ___. it uses a block cipher. widely used

A

AES

128 // 192 // 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES algorithim uses a few relativly simple steps

A

AddRoundKey
SubBytes
ShiftRows
MixColumns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

eachbit of the state is combined with the round key using bitwise XOR

A

ADDRoundKey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a non linear substituation step where each byte is replaced with another according to a lookup table

A

SubBytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a transposition step where each row of the state is shifted cyclically a certain number of steps

A

ShiftRow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a mixingoperation which operates on the colimns of the state, combining the 4 bytes in each column

A

MixColumns