Cipher Modes Flashcards
(47 cards)
Given one way function, build an invertible function
Feistel network
Inversion is same circuit for decryption, with functions applied in reverse order
Decrypting Feistel network
Using keys in reverse order
Decrypting Feistel network
16 round Feistel network
DES
E(k1, D(k2, E(k3,m))
3DES
Key size of 56 bits
DES
Key size of 168 bits
3DES
Meet in the Middle attack
Why not 2DES
Attack in 2^118
3DES attack
Revealing information about plaintext blocks
Information leakage
Attack can modify / rearrange ciphertext blocks in way that will produce predictable change
Ciphertext manipulation
Blocks of plaintext (ciphertext) can be encrypted (decrypted) in parallel
Parallelizable / Sequential
Error in plaintext (ciphertext) causes error in more than one ciphertext (plaintext)
Error propagation
Simplest form of operation, each block independently encrypted
Electronic Code Book
Each block is independently decrypted
Electronic Code Book
Information leak in ECB
Two ciphertext blocks are the same
Manipulating ciphertext in ECB
Can switch ciphertext blocks, predictable results on plaintext
Parallel processing in ECB
Yes for encryption and decryption
Ciphertext error propagation in ECB
No, errors do not propagate in ECB
Each ciphertext block depends on all preceding plaintext blocks
Cipher block chaining
Uses initialization vector to avoid duplicate ciphers for same key and same message
CBC
For a given plaintext, changing either key or __ will produce different plaintext
Initialization vector
Must be random, but can be transmitted with the ciphertext
Initialization vector
Information leakage in CBC
identical plaintext blocks produce different ciphertext blocks