misc Flashcards

(42 cards)

1
Q

3GPP uses what?

A

3GPP uses A5/3 BLOCK cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GSM uses what?

A

GSM uses the A5/1 or A5/2 STREAM cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Only two 128 bit key

A

AES

PRESENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two biggest max key size

A

RC5 - 2048

RSA - 4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PRESENT block, key, rounds

A

Block Size 64
Key size 80/128
Rounds 32
Lightweight equivalent to AES, RC5 more standardized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES block key rounds

A

Block Size 64
Key size 56
Rounds 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDEA block key round

A

Block Size 64
Key size 128
Rounds 17+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3DES block key rounds

A

Block Size 64
Key size 112
Rounds 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Skipjack

A

64-bit data blocks

80-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XTEA

A

64 block
128 key
lightweight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IKE uses what two underlying technologies?

A

PKI

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PEM

A
One of the two encoding schemes for X.509 certificates;
•Base64 
•ASCII text
•.key .crt .cer
•SSH-RSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is DER

A

One of the two encoding schemes for X.509 certificates;
•binary
•human unreadable
•.cer .der

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

lightweight asymmetric cryptography used for RFID, has diff-helman

A

Elli

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HMAC is created with what hash typically?

A

SHA-1, MD-5, Chaskey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

one-way hashing method

protects against an adaptive chosen ciphertext attack.

A

Cramer-Shoup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MD5/MD4 output size?

18
Q

SHA-1 output size?

19
Q

x5 faster than SHA-256

meant for short message hashing.

20
Q

Quark output size?

21
Q

What is Quark used for besides hashing?

A

stream cipher encryption

22
Q

Chaskey key size and use?

A

128

Lightweight MAC key signing for IoT

23
Q

64/112 bit output

24
Q

160 bit output

25
128 bit output
MD5
26
permutation vs combination?
combination - not concerned with the order | permutation - sequence matters
27
Traits of a good Pseudorandom Number Generator (PRNG)
Uncorrelated sequences and Long period
28
S-box
* obscure the relationship between the key and the ciphertext through XOR * confusion. * substitution. * lookup tables
29
P-box
* Shuffles the input bits around * diffusion. * transposed.
30
Which symmetric STREAM cipher is resistant to timing attacks?
ChaCha
31
Exhaustive search
Where the intruder uses brute force to decrypt the ciphertext and tries every possible key.
32
Chosen-ciphertext.
Where the intruder sends a message to the target, this is then encrypted with the target’s private-key and the intruder then analyses the encrypted message. For example, an intruder may send an e-mail to the encryption file server and the intruder spies on the delivered message.
33
Active attack
Where the intruder inserts or modifies messages. | Doesn't have impersonation
34
* new message is created with the same hash signature | * direct relation to the original message.
Full context.
35
* alternative message has some significance to the original and generates the same hash signature. * This is defined as a Pre-image attack.
Similar context.
36
Using (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) protects against?
DHE_EXPORT Downgrade attacks
37
difference between chosen ciphertext and known plaintext?
chosen ciphertext - actively sends data to be encrypted with the target’s private-key known plaintext - no sending data, already known
38
Looks for a rollover of the same value for an IV
replay attack
39
AES 3 vulnerabilities?
Brute force use of Non-Random Numbers copy-and-paste
40
Which two block modes are vulnerable to error propegation?
CFB, CBC
41
The two "independent" block modes
ECB, CTR
42
What is the difference between CFB and OFB?
CFB turns the block into a stream cipher/keystream generator and encrypts it bit-by-bit in real time. OFB has no error propagation because the seed value (IV) is applied BEFORE data becomes ciphertext or the XOR process. Not encrypted real time.