Chapter 3 Symmetric Key Crypto Flashcards

(33 cards)

1
Q

what are the two sub ciphers in symmetric key crypto?

A

stream cipher and block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a stream cipher?

A

based on a one time pad
the key is short
key is stretched into a long KEYSTREAM
keystream is used just like a one time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the sub contents of block cipher

A

confusion and diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a block cipher?

A

based on codebook concept
each key yields a different codebook
employs both confusion and diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the two sub contents in Stream ciphers?

A

A5/1 algorithm and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is A5/1 algorithm

A

it is based on shift registers, used in GSM mobile phone system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is RC4

A

based on a changing lookup table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

for A5/1

A
uses 3 shift registers
x: 19 bits
y: 22 bits
z: 23 bits
and at each step you take the major
and use XOR
efficient in HARDWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is RC4

A
self modifying look up table
permutation of byte values 0.1.///255
swap elements in current lookup table 
select a keystream byte from table
efficient in SOFTWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Famous man in stream cipher

A

shamir the death of stream ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a round function

A

ciphertext is obtained from plaintext by iterating a round function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the input of the round function

A

input consists of key and output of previous round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a Feistel cipher

A
a type of block cipher
splitting the plain text left and right halves
F round function
K subkey
XOR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is DES

A

Data Encryption Standard

NSA secretly involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stream ciphers..

A

idea of one time pad,we trade provable security for relatively small and manageable key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stream ciphers is confusion or diffusion

A

confusion only

17
Q

block ciphers…

A

classic code book ciphers

key determines the code book

18
Q

block ciphers is confusion or diffusion

A

employ both confusion and diffusion

19
Q

DES is

A

block cipher standards

20
Q

what is a stream cipher

A

it takes a key K of n bits in length and stretches it into a long keystream
This keystream is then XORed with the plaintext P to produce cipher text C

21
Q

What is ECB

A

Electronic Codebook

22
Q

what is Electronic Codebook

A
each block encrypted independently
identical plaintexts are encrypted similarly
no chaining, no error propagation
does not hide data patterns
alice doesn't like it
23
Q

what is CBC

A

Cipher block Chaining

24
Q

what is cipher block chaining

A

allows random access to cipher text
changing IV or the first plaintext block results in different cipher text
Error propagation
iv need not be secret but its integrity should be protected

25
what is CTR
counter
26
What is the CTR counter cipher
no chaining dependencies | no error propagation
27
what is Feistel cipher
The input is broken into two equal size blocks, Left and Right, which are then repeatedly cycled through the algorithm. each cycle, a hash function F is applied to the right block and the key, and the result of the hash is XOR-ed into the left block. The blocks are then swapped. The XOR-ed result becomes the new right block and the unaltered right block becomes the left block. the process is then repeated a number of times
28
what is DES
Data Encryption Standard
29
what is Data encryption Standard | algorithm?
it is a Feistel type substitution permeation 16 cycle Feistel system 56 key permuted into 16 rounds 48 sub keys one for each cycle L and R blocks are 32 bits each yielding an overall block of 64 bits S-boxes 32 bit data block and one 48subkeys as input output 32 bits of output
30
what is 3DES
Triple DES
31
what is the Triple DES?
it was developed to address the obvious flaws in DES. it extends the key size of DES by applying the algorithm three times with three different keys. so NO brute force
32
what is AES
Advanced Encryption Standard
33
who is AES by
by Rijndael