3.4.1 Symmetric Cryptography Flashcards

1
Q

How many keys are used in symmetric cryptography?

A

Only one, since the same key KA,B is used to encrypt and to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you have the key and the encrypted message, how can you decrypt?

A

D=(key, E(key, P)) = P, where P is the plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cite some symmetric cryptographic protocols.

A

DES, 3DES, AES, RC4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a stream cipher?

A

In stream ciphers, one bit or byte is encrypted at a time. It is based on pseudorandom bit sequence (emulating one-time pad).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cite examples of stream ciphers.

A

RC4, SEAL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a block cipher?

A

In block ciphers, blocks of equal length are encrypted at a time. Typically size are power of 2. Usually they have more diffusion than stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cite examples of block ciphers.

A

DES, 3DES, AES, IDEA, Blowfish, CAST-n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is more common: stream or block ciphers?

A

Block ciphers, because they are commonly considered more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which standard is currently being used for block ciphers?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which algorithm is used for Advanced Encryption Standard (AES)?

A

Rijndael.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shannon’s substitution-permutation network? In which cryptographic primitives is it based on?

A

Shannon’s substitution-permutation network is modern substitution-transposition product cipher. It is based on two cryptographic operations: substitution (S-box) and permutation (P-box)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which important characteristics does Shannon’s S-P Networks provide?

A

They provide confusion and diffusion of message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does diffusion in the context of cipher means?

A

Diffusion is the propriety to dissipate statistical structure of a plaintext over bulk of ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does confusion in the context of cipher means?

A

Confusion is the propriety in which makes the relationship between ciphertext and key as complex as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cornerstone of modern symmetric cryptography?

A

Shannon’s S-P networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main advantage of the Feistel model compared to a substitution-permutation network?

A

One advantage of the Feistel model compared to a substitution-permutation network is that the round function “F” does not have to be invertible.

17
Q

How to Encrypt using a Feistel model?

A

Split the plaintext block into two equal pieces, (L_0, R_0)
For each round i =0,1,…,n, compute
L_{i+1} = R_i,
R_{i+1}= L_i XOR F(R_i, K_i).

Then the ciphertext is (R_{n+1}, L_{n+1}).

18
Q

How to decrypt using a Feistel model?

A

Decryption of a ciphertext (R_{n+1}, L_{n+1}) is accomplished by computing for i=n,n-1,…,0

R_{i} = L_{i+1},
L_{i} = R_{i+1}XOR F(L_{i+1}, K_{i}).

Then (L_0,R_0) is the plaintext again.

19
Q

What happens if one or more of those parameters are increased using Feistel cipher: Block size, Key size, number of rounds, subkey generation. round function?

A

Improved security but they may slow cipher.

20
Q

Is it secure to use only substitution to generate a cipher?

A

No, because of language characteristics.

21
Q

Is it secure to use only transposition to generate a cipher?

A

No, because of language characteristics.

22
Q

Explain what happens if the following operations are being used:

  1. two substitutions
  2. two transpositions
  3. substitution followed by a transposition
A
  1. make a more complex substitution
  2. make a more complex transposition
  3. makes a new much harder cipher
23
Q

What is the bridge between classical to modern ciphers?

A

The use of transposition associated with substitution.

24
Q

What is the avalanche effect?

A

It is the key desirable property of encryption algorithm in which a change of one input or key bit results in changing approximately half of the output bits - highly non-linear, chaotic behavior.

25
Which symmetric cryptographic protocol exhibits a strong avalanche effect?
Data Encryption Standard (DES).
26
Which kind of key is considered weak for Data Encryption Standard (DES) security?
- Keys that generate subkeys with either all 0's or all 1's (four in total) - Keys that generate only two different subkeys (six pair of keys) -> those are considered semiweak keys. - Keys that generate only four different subkeys (48 keys) -> those are considered possible weak keys. As whole, 64 keys out of ~7.2 x10^16 are considered weak.
27
Algebraic structure: is DES closed?
No, DES is not closed. It means that it is possible to use double encryption, since it is not true that for every K1 and K2 there is a K3 such as E(K2, E(K1,M)) = E(K3,M). Since this is not true, double encryption might be used.
28
Algebraic structure: is DES pure?
No, DES is not pure. By not being pure, DES allows to use triple encryption to increase the key length. To be pure, for every K1, K2, K3 there would be a K4 such that E(K3, E(K2, E(K1, M))) = E(K4, M). Since DES is not pure, it is possible to use 3-DES.