Ch6 Flashcards
a remote user is asked to encrypt a message using a key known only to the communicating parties
Challenge Response protocol
symmetric protocols, block and key size
Name Blocksize Keysize AES 128 128, 192, 256 Rijndael Variable 128, 192, 256 Blowfish Variable 1-448 DES 64 56 IDEA 64 128 RC2 64 128 RC4 Streaming 128 RC5 32,64,128 0-2040 Skipjack 64 80 3DES 64 112 or 168 Twofish 128 1-256
what encryption algorithm uses pre/post whitening
Twofish
how many rounds of encryption for 128 bit key; 192bit; 256bit
10, 12, 14 rounds of encryption
What algorithm was used by US government supported escrow of encryption keys in Clipper and Capstone encryption chips
Skipjack - National Institute of Standards and Technology (NIST) and the Department of the Treasury, hold a portion of the information required to reconstruct a Skipjack
key.
begins its operation with a 128-bit key. This key is broken up in a series of operations into 52 16-bit subkeys and is used in PGP
IDEA
DES-EDE3
triple DES but replaces the second encryption operation with a decryption operation
Assymetric Protocols
- RSA
- Diffie-Hellman
- Digital Signature Algorithm
- ElGamal
- ECDSA
- XTR
- extension of Diffie-Hellman key
- predecessor of DSA
- doubles the length of any message it encrypts
El Gamal
- most commonly used asymmetric algorithm
- used both for encryption and for digital signatures
- uses prime numbers
RSA
cryptographic systems of symbols that operate on words or phrases; sometimes secret but do not always provide confidentiality
codes
always meant to hide the true meaning of a message
cipher
change in the plain text results in multiple changes spread throughout the ciphertext
diffusion
extremely powerful substitution cipher that are randomly generated, physically protected, used only once and key is as long as the message to be encrypted
one-time pads
another name for one-time pad
vernam cipher
a communication concept where a specific type of information is exchanged but no real data is transferred, such as with digital signatures and certificates
zero-knowledge proof
what are the four operational modes of DES
ECB
CBC
CFB
OFB
Electronic Codebook
least secure & used for only short messages
Cipher Block Chaining
- each block of unencrypted text is XORed with the
block of ciphertext immediately preceding it before it is encrypted using the DES algorithm - uses an IV
- errors will propagate
Cipher Feedback Mode
- same as CBC but is a streaming cipher version
Output Feedback Mode
- same as CFB
- instead of XORing an encrypted version of the previous block of ciphertext, DES XORs the plain text with a seed value
- no chaining so no error propagation
Counter Mode
- used in parallel computing
- uses stream cipher with counter that increments for each operation
what is vulnerable to frequency analysis attacks
Caesar cipher and other simple substitution ciphers
a cryptographic system should be secure
even if everything about the system, except the key, is public knowledge
Kerchoff principle
MD5 produces a ____bit message digest for ANY input
128