DES and Cryptanalysis Flashcards

Lecture 6 (11 cards)

1
Q

What is the key schedule in DES?

A

DEs key schedule returns various permutations of k as sub-keys for later Feistel networks e.g. key 1for feistel network 1, key 2 for feistel network 2, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PC-1 in DES?

A

PC-1 selects 56 of the 64 bits in the original key. The other parity bits are discarded, and these key bits are removed in a systematic manner i.e. the same key bits every time are removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the properties of the key schedule?

A
  • It is entirely permutation based
  • Doesn’t use XOR, addition or any other mixing operation
  • The last round of key permutation is the same key as the first key calculated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do meet-in-the-middle attacks work?

A

They split the search space in two, and start by calculating encryptions and store intermediate values. They then calculate all decryptions and then find any value that matches the intermediate values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the practicalities of Meet-in-the-middle attacks?

A
  • Requires 2^(k + 1) attempts rather than 2^(k * 2)
  • Trades computation for storage e.g. petabytes needed for DES
  • Assumes some kind of O(1) lookup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why did people start using triple DES instead of standard DES?

A
  • Increased key sizes e.g. 168-bits, which made brute force attacks significantly harder
  • Resisted known attacks on DES e.g. differential and linear cryptanalysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What were some issues with Triple DES?

A
  • 3x slower than DES
  • Smaller block size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of attacks on cryptographic systems, in order of least strong to most strong?

A
  • Brute force
  • Ciphertext-only
  • Known-plaintext
  • Chosen-plaintext
  • Chosen-ciphertext
  • Related-key attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of attacks in cryptanalysis?

A

Analytical attacks - Exploit some underlying structural or mathematical weakness in a cipher
Statistical attacks - Capture statistical patterns between input and output to recover key bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Differential Cryptanalysis work, and what sort of strength level is it?

A

Aims to find predictable changes in output bits caused by known changes in input bits.
It’s a chosen plaintext attack, so quite strong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you resist differential cryptanalysis?

A
  • S-Boxes must be designed such that the probability of any pair is as low as possible
  • More rounds make differentials less likely
  • Good permutation to involve more S-Boxes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly