Chapter 2: Cryptographic Tools Flashcards

1
Q

What are the five ingredients of a symmetric encryption scheme?

A
Plaintext
Encryption Algorithm
Secret Key
Ciphertext
Decryption Algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two requirements for secure use of symmetric encryption?

A

A strong encryption algorithm

Sender and receiver must have obtained copies of the secret key in a secure fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two general approaches to attacking a symmetric encryption scheme and a secure hash function?

A

Cryptanalysis

Brute-Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the most important symmetric algorithms (all of which are block ciphers)?

A

Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two concerns over the Data Encryption Standard?

A

that this algorithm uses a 56-bit key

as this is the most-studied encryption algorithm, that a fatal weakness may be discovered due to cryptanalysis (none has yet been discovered as of today 01/2015)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Running a brute-force attack is not as simple as running through all possible keys. What other challenges must an attacker overcome?

A

unless known plaintext is provided, the analyst must be able to recognize plaintext as plaintext

if the message is just plain text in English the whole process is easy, but the task of recognizing English would have to be automated

if the message is compressed before encryption, recognition is made even more difficult

if the message is a general type of data (a numerical file), recognition is made even more difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which group made the “DES cracker” machine that broke DES in less than 3 days in 1998?

A

Electronic Frontier Foundation (EFF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two reasons that 3DES has not been adopted as the appropriate choice for a standardized encryption algorithm?

A

3DES is relatively sluggish

both 3DES and DES use a 64-bit block size. A larger block size is desirable for efficiency and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What were the five evaluation criteria categories that NIST used to grade the new Advanced Encryption Standard (AES)?

A
security
computational efficiency
memory requirements
hardware and software suitability
flexibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly