Block-ciphers Flashcards
Practical block ciphers consist of several rounds.
a) What do we achieve by using rounds in block ciphers?
b) Each round of a block cipher uses a key that is obtained from the master key. What is the name of the process of obtaining these round keys?
Practical block ciphers use confusion and diffusion to make cryptanalysis difficult. They also consist of several rounds.
a) Define confusion. How do we achieve it?
b) Define diffusion. How do we achieve it?
c) What do we achieve by using rounds in block ciphers?
a) Many block ciphers contain non-linear Boolean tables, so-called S-boxes. What do we achieve with them?
b) Block ciphers also contain bit-permutations. What is their role?
c) Why are practical block ciphers composed of several rounds?
d) What is the key schedule of a block cipher? Is it a good idea to use only linear functions in the key schedule? Why?
Explain the output feedback mode of operation of block ciphers.
For a fixed key, the encipherment transformation of a block cipher is the following:
010
001
100
010
110
111
000
011
Can we decipher in such a cipher system? If so, determine the decipherment transformation.
a) How do we achieve confusion in block ciphers?
b) Why must every block cipher be a permutation of 2n entries where n is the block length?
c) Explain the cipher block chaining mode of operation of block ciphers.
Explain the counter mode of operation of block ciphers.
a) Explain the difference between Feistel-type block ciphers and SubstitutionPermutation networks. (5 points)
b) Explain the counter mode of operation of block ciphers. (10 points)
a) What is the perfect block cipher? Why is such a cipher impractical?
b) How many rounds are needed in a Feistel-type block cipher to ensure non-linear transformation of all the input bits? Why?
c) Explain the cipher block chaining.
Find the linear complexity, the initial state and the feedback polynomial of the minimal LFSR that generates the sequence S=1100101 in GF(2), by means of the BerlekampMassey algorithm. Draw the LFSR after processing each bit of S. The Berlekamp-Massey algorithm is given below:
IMT4552+Cryptology2+09august2016.pdf
a) Check whether the polynomial f (x) + x 3 + x 2 + 1 with coefficients in GF(2) is irreducible.
b) Check whether the polynomial f (x) — + x 3 + 1 with coefficients in GF(2) is primitive.
IMT4552+Cryptology2+09august2016.pdf
Given the irreducible polynomial f (x) = 1 + x + x 2 + x 3 + x 5 , with coefficients in GF(2), the polynomials with coefficients in GF(2) a(x) = 1 and b (x) = x4 + 1, design the S-box F (x) = a(x)x d + b(x) such that d is a Gold’s function d = 2 k + 1, (n, k) — 1, 1 k m, n = 2m + 1, n = deg f (x). Set k=l. What is the non-linear order of each Boolean function realized by the obtained S-box?
IMT4552+Cryptology2+09august2016.pdf
Compute for the following S-box:
Addr.01234567
Cont.52706413
a) The following elements of the linear approximation table: (0,2), (2,4).
The following elements of the difference distribution table: (1,7), (4,6)
IMT4552+Cryptology2+09august2016.pdf
Find the linear complexity, the initial state and the feedback polynomial of the minimal LFSR that generates the sequence S—OI 1 101 in GF(2), by means of the BerlekampMassey algorithm. Draw the LFSR after processing each bit of S, The Berlekamp-Massey algorithm is given below
IMT4552+Cryptology2+07januar2016.pdf
Check whether the polynomial f (x) = x 5 + x 3 + 1 with coefficients in GF(2) is primitive. Hint: try irreducibility first and then, iff(x) is irreducible, check the conditions of the Alanen-K-nuth-Herlestam theorem.
IMT4552+Cryptology2+07januar2016.pdf