Symmetric key cryptography Flashcards

1
Q

what are the strengths of symmetric key cryptography?

A

Speed/ Efficient Algorithms – much quicker
than Asymmetric
Hard to break when using a large Key Size
Ideal for bulk encryption / decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the weaknesses of symmetric key cryptography?

A

Poor Key Distribution (must be done out of
band – ie phone, mail, etc)
Poor Key Management / Scalability (each user
needs a unique key)
Cannot provide authenticity or non-repudiation
– only confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why was AES introduced?

A

Clearly, a replacement for DES was needed
– have theoretical attacks that can break it
– have demonstrated exhaustive key search attacks
•Can use Triple-DES – but slow with small blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the problems with ECB?

A

•Repetitions in message may show in ciphertext if
aligned with message block particularly with data such
graphics
•Messages that change very little
•Weakness due to encrypted message blocks being
independent
•Main use is sending a few blocks of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are uses of CBC?

A

bulk data encryption , authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the advantage of CBC?

A

Each ciphertext block depends on all preceding message
blocks thus a change in the message affects all ciphertext
blocks after the change as well as the original block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the weakness of CBC?

A

Need Initial Value (IV) known to sender & receiver
however if IV is sent in the clear, an attacker can change
bits of the first block, and change IV to compensate hence
either IV must be a fixed value or it must be sent encrypted
in ECB mode before rest of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compare CFB and OFB

A

CFB - Errors will propagate in this mode
- No IV required

OFB - Errors will not propagate in this mode
- IV required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the use of CTR

A

high-speed network encryptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the advantages and limitations of CTR

A
can do parallel encryptions in h/w or s/w
•can preprocess in advance of need
•good for high speed links
•random access to encrypted data blocks
•provable security (good as other modes)
•but must ensure never reuse key/counter
values, otherwise could break
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the use of key escrow

A

Key escrow is a data security measure in which a cryptographic key is entrusted to a third party (i.e., kept in escrow).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly