Stream Ciphers, Randomness and OTP Flashcards

Lecture 3 (12 cards)

1
Q

What are some key features of Stream Ciphers?

A
  • Encrypt one bit/byte at a time
  • Encrypt using modulo 2 addition, also known as XOR
  • Encryption and decryption options are identical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How secure is XOR in Stream Ciphers?

A

XOR is only as secure as the keystream that is generated i.e. if it’s a perfectly randomly generated keystream, then it’s flawless. However, if it isn’t and is used more than twice, then security collapses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is pseudo-randomness (PRNGs)?

A

They are generated values based on a seed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are CSPRNGs?

A

They are an alternate variation of PRNGs, which are unpredictable, deterministic and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do CSPRNGs require?

A
  • Next-bit unpredictability i.e. if you know the first bit, you shouldn’t be able to predict the next bit, etc…
  • Backtracking resistance i.e. previous communications should still be secure even if future communications are broken
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unconditional security?

A

A cryptosystem is unconditionally or information-theoretically secure if it cannot be broken even with infinite computational resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Perfect Secrecy?

A

The ciphertext should reveal absolutely no information about the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the One-Time-Pad?

A

The OTP is a type of stream cipher where the keystream is:
- Truly random
- As long as the message
- Used only once
- Kept secret

If all conditions are met, then it provides perfect secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is the One-Time-Pad not practical?

A
  • The keystream would need to be the same size as the file e.g. a 1GB file would have a 1GB keystream.
  • You cannot ever re-use a keystream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do modern stream ciphers do to generate their keystreams?

A

They use an initial seed key to generate an infinite pseudorandom keystream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Crib Dragging?

A

Crib Dragging is when you take two ciphertexts produced by a stream cipher, and XOR them together to ‘cancel out’ the keystream, leaving the XOR of the two original plaintexts. This only works if the two messages are encrypted using the same OTP keystream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do modern stream ciphers use a nonce to generate their keystreams?

A

They use a nonce to alter the keystream for a given key, thereby allowing for multiple different configurations of keystreams using the same seed. The security requirement then ensures you use a unique key and nonce pair for each communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly