Chapter 2: Cryptographic Tools Flashcards
What are the five ingredients of a symmetric encryption scheme?
Plaintext Encryption Algorithm Secret Key Ciphertext Decryption Algorithm
What are two requirements for secure use of symmetric encryption?
A strong encryption algorithm
Sender and receiver must have obtained copies of the secret key in a secure fashion
What are the two general approaches to attacking a symmetric encryption scheme and a secure hash function?
Cryptanalysis
Brute-Force Attack
What are the most important symmetric algorithms (all of which are block ciphers)?
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
What are two concerns over the Data Encryption Standard?
that this algorithm uses a 56-bit key
as this is the most-studied encryption algorithm, that a fatal weakness may be discovered due to cryptanalysis (none has yet been discovered as of today 01/2015)
Running a brute-force attack is not as simple as running through all possible keys. What other challenges must an attacker overcome?
unless known plaintext is provided, the analyst must be able to recognize plaintext as plaintext
if the message is just plain text in English the whole process is easy, but the task of recognizing English would have to be automated
if the message is compressed before encryption, recognition is made even more difficult
if the message is a general type of data (a numerical file), recognition is made even more difficult
Which group made the “DES cracker” machine that broke DES in less than 3 days in 1998?
Electronic Frontier Foundation (EFF)
What are two reasons that 3DES has not been adopted as the appropriate choice for a standardized encryption algorithm?
3DES is relatively sluggish
both 3DES and DES use a 64-bit block size. A larger block size is desirable for efficiency and security
What were the five evaluation criteria categories that NIST used to grade the new Advanced Encryption Standard (AES)?
security computational efficiency memory requirements hardware and software suitability flexibility