Modern Ciphers Flashcards

1
Q

What is a keystream generator?

A

An algorithm that generates streams of random digits/characters which are combined with plaintext to produce the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do block ciphers encrypt?

A

Encrypt a block of bits at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does cipher Block Chaining work?

A

Each plaintext block is XORed with previous block and then encrypted. The initialization vector is XORed with the first plaintext block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the design guidelines for encryption schemes?

A

Diffusion and Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define diffusion:

A

Changing one bit in the plaintext changes “many” bits in the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define confusion:

A

The relation between ciphertext, plaintext and key should be as complex as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a stream cipher?

A

A cipher in which the plaintext is XOR with some key/keystream into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the security of the stream cipher rely on?

A

The security of the keystream generator. Keystream must be unpredictable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a feedback shift register?

A

A register which is blocks of bits. We use a feedback function which takes the whole register as an input and outputs a new block which is inserted into the head of the register, therefore discarding the last block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a linear-feedback shift register?

A

A linear-feedback shift register is a shift register whose input bit is a linear function of its previous state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the vulnerability of Linear Feedback Shift Registers?

A
  • Very predictable as everything shifts using a predefined feedback function
  • Given 1 consecutive bits of the key stream, the attack can compute all future bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we further secure LSFR?

A

Separate the key stream from the inner state of the PRNG by using multiple LFSR and combining them with a combiner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should a LSFR function be?

A
  • Non-linear
  • Correlation immune
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a correlation attack work?

A
  • Try all possible initial values for the first LFSR
  • Use the correlation to check if a guessed initial value is correct
  • In the worst case the attacker can brute force all LFSRs separately instead of having to brute force them all together
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When can a correlation attack be performed?

A

When the function f combiner is correlated to one of its inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ECB block cipher method?

A

Each block of plaintext is independently encrypted using the block cipher.

17
Q

What is a counter mode block cipher?

A

Counter mode turns a block cipher into a stream cipher by encrypting a counter value for each block. The counter value is XORed with the plaintext to produce the ciphertext

18
Q

What are substitution Permutation Networks (S-P Networks)?

A

Encrypt blocks through multiple rounds of permutations and substitutions

19
Q

What are S-Boxes (substitution)?

A

Non linear substitution that works on part of the input. Source of confustion

20
Q

What are P-boxes (permutations)?

A

Linear maps which are not bijective. Source of diffusion

21
Q

What are the vulnerability of DES?

A
  • Small key size, capable of brute force attacks
  • Short block bit length, more block bit length provides more security
22
Q

What are interpolation attacks?

A

If the attacker knows many values, then the attack can find the polynomial

23
Q

What is the rough algorithm for DES?

A
  1. Key selection mechanism: Make the 48-bit key into 16 “round keys” which are permutations of the original key
  2. Kernel map: performs the substitution and permutation through S-Boxes and a P-box
  3. 16 rounds of this iteration