Domain 3 - Advanced Crypto Flashcards

1
Q

Cipher Block Chaining (feedback in stream modes)

A

Uses the previous ciphertext from the previous block, and uses it to XOR’ the next block. First block uses an Initialization Vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES ECB

A

Electronic Code BookNo initialization vectorsusceptible to replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES CBC

A

Cipher Block Chaining- Block Mode- XORs previous block as seed to next block- First encrypted block is IV for next.- Errors propogate. An error in one block propagates everywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DES CFB

A

Cipher Feedback - Stream- Uses feedback to destroy patterns- Uses IV - Errors propogate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES - OFB

A

Output Feedback- XORs previous block as seed to next block- Stream cipher- Uses subkey before it is XORed to plaintext- Subkey is not affected by Encryption errors- errors don’t propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES CTR

A

Counter- Uses a counter- Errors don’t propogate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2TDES

A

Two triple DES. Uses 1 key to encrypt, another to ‘decrypt’ and again key 1 to encrypt. Key length of 112 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3TDES

A

Strongest form, three triple des168 bits in key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES Functions

A

SubbytesShiftRowsMixColumnsAddRoundKey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES data State

A

4 Rows of 4, 16 byte blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES SubBytes

A

Uses substitution to add confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES ShiftRows

A

Shifts the rows to add confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES MixColumns

A

Provides diffusion by mixing the columns fo the state via finite field mathematics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES AddRoundKey

A

Final functionXORs the state with the subkey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MD5 creator

A

Ronald Rivest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDEA block and key sizes

A

64 bit block128 bit key.

17
Q

Blowfish Key size and block size

A

Key size 32 - 448 bits64 bit blocks

18
Q

Twofish Key and Block Sizes

A

Key 1-256 bitsBlock 128 bits

19
Q

RC5 block size, Key size

A

Block: 32, 64, 128Key: 0 -2040 bits

20
Q

RC6 Block size, key size

A

128 bit blocksKey: 128, 192, 256

21
Q

MD5 Acronym and length

A

Message Digest 5 128 bit hash value based on any input length. Prone to collisions

22
Q

SHA-1 Acronym and length

A

Secure Hash Algorithm160 bit hash value

23
Q

HAVAL acronym and length

A

Hash of variable length. Uses design principles of MD family128, 160, 192, 224, and 256 bits

24
Q

HAVAL number of rounds

A

3, 4, 5