Lecture 4 Flashcards

1
Q

What are the pros of block ciphers?

A
  1. Greater diffusion than stream ciphers.
  2. Uses blocks (so plaintext length does not need to match the key)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the cons of block ciphers?

A
  1. Less efficient than stream ciphers.
  2. There is a higher error propagation effect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What network does 3DES use?

A

Feistal Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is 3DES used and not 2DES?

A

2DES is vulnerable to meet-in-the-middle attacks. This means that 2DES has 2^n+1 steps compared to the desired 2^2n if the algorithm scaled correctly.

Meet in the middle: could potentially decrypt a piece of ciphertext with one key and encrypt the plaintext with another key, and then search for a match. This significantly reduces the effort needed to break the encryption. 3DES, with its three layers of encryption, is not susceptible to this type of attack in the same way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Feistal Network?

A

A function that remains invertible even if using non-invertible functions. This ensures confusion and diffusion which are necessary for sound encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly