2- Stream and block ciphers Flashcards

1
Q

Stream cipher

A

encrypts one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Block cipher

A

Encrypts block of ptext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key management for stream ciphers

A

short symmetric keys - easier than 1-time pad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stream ciphers properties

A

1- no error propagation
2- speed: real time
3- on the fly encryption
4- need for synchronisation (A,B) must have the same keystream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stream ciphers use

A

internal n/works - no compatibility problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Block ciphers advantages

A

1) versatility: other uses
2) compatibility: widely implemented
3) adaptability: different modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block ciphers disadvantages

A

1) error propagation
2) need for padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES in words

A

data encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DES (Feistel) cipher process

A

1- divide ptext into L and R
2- function f(R,K)
3- X = L xor f(R,K)
4- R1=X, L1=R
Repeat m times
5- concat Rm, Lm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3x DES

A

1- DES Enc.
2- DES Dec.
3- DES Enc.
-ctext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES in words

A

advanced encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES process

A

0- input 16 bytes
1- byte substitution (from S-box)
2- shift rows
3- mix columns
4- add round key (xor) from key schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES applications

A

soft- and hardware (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Block cipher modes

A

1- ECB - electronic code book
2- CBC - cipher block chaining
3- CFB - cipher feedback
4- CTR - counter mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECB process

A

encrypts 1 block at a time using the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CBC process

A

1- IV xor P0
2- Enc. (1) with key => C1
3- C1xor P1
//=> Ci = Ek(Pi xor C(i-1))

17
Q

CFB process

A

1- Ek(IV)
2- P0 xor (1)
3- Ek(C0)…
//=> Ci = Pi xor Ek (C[i-1])

18
Q

CTR process

A

0- initial counter is IV
1- encrypt counter with a key
2- P xor (1)

19
Q

List of modes properties

A

1) positional dependency
2) error propagation
3) synchronisation
4) efficiency, parallelisation
5) padding