19: Symmetric Key Encryption Flashcards

1
Q

What is a symmetric key algorithm ?

A

An algorithm which uses the SAME key for encryption and for decryption of a cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What a symmetric key algorithm alternatively called ?

A

Shared-key, single-key, secret-key, private-key or one-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which algorithms are symmetrical ?

A
  • Caesar
  • Vignère
  • Rotor machines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give 2 types of symmetric key algorithms ?

A
  • Stream ciphers: one at a time (bytes)

- Block ciphers: blocks at a time (64 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is confusion ?

A

The act of making the relationship between the key and the cipher text as complex as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is diffusion ?

A

The act of making output should depend on the input in a complex way, eg by having a strong encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is End-to-End encryption ?

Where should it be done ?

What is it best for ?

A

messages are encrypted by the sender and only decrypted by the intended receiver.

But headers with a source and destination remain unencrypted, meaning traffic analysis is possible.

Encryption should be done by a user at the software level

Best for actual data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Link encryption ?

Where should it be done ?

What is it best for ?

A

Messages are encrypted and decrypted at each end of a communication link.

All traffic can be secure at the hardware level, not only isolated messages.

But original input text is revealed at every node on its way, making it less secure.

Best for headers data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strengths of symmetric keys ?

A
  • Simple
  • Low resources required
  • Can create a key per channel. If one channel is compromised, only messages between those 2 are affected. Others channels are not.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Weaknesses of symmetric keys ?

A
  • Key distribution/sharing.
  • New key per channel.
  • Keys management and security.
  • Origin and authenticity aren’t guaranteed since both parties use same key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly