3.2 Symmetric Cryptography Flashcards

1
Q

What is DES?

A

Data Encryption Standard is one of the most well-known symmetric encryption algorithms implemented by IBM in the 1970s that was intended to serve as the federal encryption standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does each F-box do in DES?

A

Each F-box performs a combination of substitution and transposition operations using the Feistel function.

  1. They each take half a block of input (32bits) and combines it with a piece of the encryption key (48bits).
  2. Then, that input is broken into 8 segments and fed into 8 different functions called S-boxes. Each of these boxes contains a different substitution cipher.
  3. The results of all those substitutions are then combined together again and fed into a P-box. The p-box scrambles up the output of the S-boxes to produce the output.
  4. This is repeated 16 times.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DES work?

A

Data Encryption Standard uses an encryption operation
called the Feistel function for 16 rounds of encryption.

The algorithm takes 64 bits of plaintext as input in the top and then runs it through an encryption operation known as the Feistel function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does S stand for in S-box?

A

Substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does F stand for in F-box?

A

Feistel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does P stand for in P-box?

A

Permutation.

Permutation is just another word for transposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is DES considered secure?

A

No. It is no longer being considered secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four key facts about DES?

A
  1. DES is a symmetric encryption algorithm.
  2. DES is a block cipher operating on 64-bit blocks.
  3. DES has a key length of 56 bits.
  4. DES is now considered insecure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Triple DES (3DES)?

A

It’s the application of DES three times on the same input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three keying options for 3DES?

A
  1. Key 1, Key 2, and Key 3 are all different.
  2. Key 1 and Key 3 are the same, Key 2 is different.
  3. All the keys are the same.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why 3DES? Why not just use DES twice?

A

Double DES is no more secure than DES, due to the meet-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four key facts about 3DES?

A
  1. 3DES is a symmetric encryption algorithm.
  2. 3DES is a block cypher operating on 64-bit blocks.
  3. 3DES has an effective key length of 112 bits.
  4. 3DES is considered weak and being phased out.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the Rijndael algorithm?

A

It’s the algorithm that won a competition to become the AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does AES use at a high level?

A

Transposition and substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four key facts about AES?

A
  1. AES is a symmetric encryption algorithm.
  2. AES is a block cipher operating on 128-bit blocks.
  3. AES uses key lengths of 128, 192, or 256 bits.
  4. AES is considered secure.
17
Q

What is Blowfish?

A

Blowfish is a public domain algorithm that is designed as a DES replacement. It uses a Feistel network to combine substitution and transposition.

18
Q

What are the four key facts about Blowfish?

A
  1. Blowfish is a symmetric encryption algorithm.
  2. Blowfish is a block cipher operating on 64-bit blocks.
  3. Blowfish has any key length between 32 and 448 bits.
  4. Blowfish is no longer considered secure.
19
Q

What is Twofish?

A

Twofish is a public-domain encryption algorithm that was designed as a replacement for DES. It relies on a Feistel network and relies on substitution and transposition.

20
Q

What are the four key facts about Twofish?

A
  1. Twofish is a symmetric encryption algorithm.
  2. Twofish is a block cipher operating on 128-bit blocks.
  3. Twofish uses key lengths of 128, 192, or 256 bits.
  4. Twofish is considered secure.