19: Symmetric Key Encryption Flashcards
What is a symmetric key algorithm ?
An algorithm which uses the SAME key for encryption and for decryption of a cipher text.
What a symmetric key algorithm alternatively called ?
Shared-key, single-key, secret-key, private-key or one-key encryption.
Which algorithms are symmetrical ?
- Caesar
- Vignère
- Rotor machines
Give 2 types of symmetric key algorithms ?
- Stream ciphers: one at a time (bytes)
- Block ciphers: blocks at a time (64 bits)
What is confusion ?
The act of making the relationship between the key and the cipher text as complex as possible
What is diffusion ?
The act of making output should depend on the input in a complex way, eg by having a strong encryption algorithm.
What is End-to-End encryption ?
Where should it be done ?
What is it best for ?
messages are encrypted by the sender and only decrypted by the intended receiver.
But headers with a source and destination remain unencrypted, meaning traffic analysis is possible.
Encryption should be done by a user at the software level
Best for actual data.
What is Link encryption ?
Where should it be done ?
What is it best for ?
Messages are encrypted and decrypted at each end of a communication link.
All traffic can be secure at the hardware level, not only isolated messages.
But original input text is revealed at every node on its way, making it less secure.
Best for headers data.
Strengths of symmetric keys ?
- Simple
- Low resources required
- Can create a key per channel. If one channel is compromised, only messages between those 2 are affected. Others channels are not.
Weaknesses of symmetric keys ?
- Key distribution/sharing.
- New key per channel.
- Keys management and security.
- Origin and authenticity aren’t guaranteed since both parties use same key.