Exam 1 Flashcards

1
Q

name an advantage of perfect secrecy

A

key cannot be cracked or discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

name a disadvantage of perfect secrecy

A

difficult to communicate the key pad/ difficult to maintain syncronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does the CIA stand for

A

Confidentiality
integrity
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what properties should and ideal block cipher have?

A
  • encryption should be reversible ( Decryption should always return the original message and have a one to one mapping)
    -encryption/decryption should be easy with key and difficult otherwise
    -computing the mapping should be efficient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a pseudo-random permutaion

A

key defines the permutation
permutation is random-looking
efficient ot compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the feistel network and how many block bits and key bits dows it require

A

A method of turning astrong PRF to a strong PRP in 4 easy steps
uses a 64 bit block and 56 bit ke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what did claude shannon introduce

A

a substitution-permutation (S-P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what did claude shannon achieve

A

Confusion through substittion
Diffusion through permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is confusion and diffusion

A

confusion is obscuring the local correlation between plaintext and ciphertext
diffusion is hiding the plaintext statististics by spreading it oer a larger area of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the main limitation of ECB and what is the cause for this limitation?

A

message repetitions may show in cipher text due to the encrypted message blocks being independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is CBC

A

Cipher Block Chaining breaks up repetition in plaintext by XORing each block with a random-looking value

it uses an initialization vector which is a one time vector sent along with ciphertext and gets sent unencrypted. it needs to be unpredictable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the advantages of ECB

A

parallel encryption of blocks of bits
simple way of block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the main disadvantage of CBC

A

parallel encryption is not possible since every encryption requires a previous cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the advantages of CTR

A

there is no relationship between cipher text and plain text
parallel execution of encryption is still possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the disadvantages of CTR

A

requires a lot of synchronisation for maintaining counters

can’t be used safely with small block length ciphers (3DES for example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are osme otehr encryption modes (besides ECB, CTR, CBC)

A

Cipher feedback mode (CFB
output feedback mode (OFB)
XTS for random access applications
Offset codebook (OCD and Galios/counter (GCM for authenticated encryyption

17
Q

what are teh bit distributions for the rijndael AES cipher

A

128/192/256 bit keys
10/12/14 rounds
128 bit data

18
Q

what is the main difference between the AES and feistel network

A

unlike the feistel network, hte AES encryption uses the PRP round function

19
Q

what is the main similarity between AES and Feistel network

A

similar to feistel, AES uses a key schedule to make each round effectively different

20
Q

what are the 4 security services

A

authentication: assurance that the communicating entity is the one claimed

access control: prevention of the unauthorized use of a resource

data confidentiality: protection of data from authorised disclosure

data integrity: assurance that the data received is as sent by an authorized entity

non-repudiation: protection against denial by one of the parties in a communication

21
Q

what are some active attacks

A

masquerade: takes place when one entity pretends to be a different entity by capturing and replaying an authentication sequence

replay is the passive capture of a data unit and its subsequent retransmission

modification of messages

denial of service

22
Q

what are the 3 goals of crypto system designers

A

key space exponential in key length
infusible to brute force
make brute force the best strategy to crack the cipher

23
Q
A