Ch6 Flashcards

1
Q

a remote user is asked to encrypt a message using a key known only to the communicating parties

A

Challenge Response protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

symmetric protocols, block and key size

A
Name          Blocksize     Keysize
AES             128               128, 192, 256
Rijndael       Variable       128, 192, 256
Blowfish      Variable       1-448
DES             64                 56
IDEA            64                 128
RC2             64                 128
RC4             Streaming    128
RC5             32,64,128     0-2040
Skipjack      64                 80
3DES           64                 112 or 168
Twofish       128                1-256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what encryption algorithm uses pre/post whitening

A

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how many rounds of encryption for 128 bit key; 192bit; 256bit

A

10, 12, 14 rounds of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithm was used by US government supported escrow of encryption keys in Clipper and Capstone encryption chips

A

Skipjack - National Institute of Standards and Technology (NIST) and the Department of the Treasury, hold a portion of the information required to reconstruct a Skipjack
key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

begins its operation with a 128-bit key. This key is broken up in a series of operations into 52 16-bit subkeys and is used in PGP

A

IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DES-EDE3

A

triple DES but replaces the second encryption operation with a decryption operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assymetric Protocols

A
  • RSA
  • Diffie-Hellman
  • Digital Signature Algorithm
  • ElGamal
  • ECDSA
  • XTR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • extension of Diffie-Hellman key
  • predecessor of DSA
  • doubles the length of any message it encrypts
A

El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • most commonly used asymmetric algorithm
  • used both for encryption and for digital signatures
  • uses prime numbers
A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cryptographic systems of symbols that operate on words or phrases; sometimes secret but do not always provide confidentiality

A

codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

always meant to hide the true meaning of a message

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

change in the plain text results in multiple changes spread throughout the ciphertext

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

extremely powerful substitution cipher that are randomly generated, physically protected, used only once and key is as long as the message to be encrypted

A

one-time pads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

another name for one-time pad

A

vernam cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a communication concept where a specific type of information is exchanged but no real data is transferred, such as with digital signatures and certificates

A

zero-knowledge proof

17
Q

what are the four operational modes of DES

A

ECB
CBC
CFB
OFB

18
Q

Electronic Codebook

A

least secure & used for only short messages

19
Q

Cipher Block Chaining

A
  • each block of unencrypted text is XORed with the
    block of ciphertext immediately preceding it before it is encrypted using the DES algorithm
  • uses an IV
  • errors will propagate
20
Q

Cipher Feedback Mode

A
  • same as CBC but is a streaming cipher version
21
Q

Output Feedback Mode

A
  • same as CFB
  • instead of XORing an encrypted version of the previous block of ciphertext, DES XORs the plain text with a seed value
  • no chaining so no error propagation
22
Q

Counter Mode

A
  • used in parallel computing

- uses stream cipher with counter that increments for each operation

23
Q

what is vulnerable to frequency analysis attacks

A

Caesar cipher and other simple substitution ciphers

24
Q

a cryptographic system should be secure

even if everything about the system, except the key, is public knowledge

A

Kerchoff principle

25
Q

MD5 produces a ____bit message digest for ANY input