Chapter 20: Cryptographic Algorithms Flashcards

1
Q

What is symmetric encryption?

A

Encryption based on substitution and transposition. Earliest form from ancient Egypt. Secret key shared by both parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is asymmetric encryption ?

A

Encryption using a matermaticwlly related public and private key pair for encryption. Public key of the receiver is used to encrypt the senders message. Private key of receiver is used to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DES?

A

Data encryption standard. 1970. Block cipher (takes several blocks at a time and encrypt block by block) based on lucifer cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did the NSA add to DES?

A

S-boxes (substitution boxes). 1976. This decreased the key length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why was 3DES created?

A

To prevent attacks. Used 1,2 or 3 56b keys. It was designed to strengthen the algorithm and be backward compatible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is 3DES?

A

Strengthened DES. effective key sizes of 56, 112 or 168b. Two rounds of encryption. One round of decryption. Backward compatible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps of the DES function?

A
  1. Expansion
  2. Key mixing
  3. Substitution
  4. Permutation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the expansion process of DES?

A

32b input to a 48b output. On nibble, duplicate partition bits. All other bits shift one to the right. Circular. Nibble partition bits duplicate twice in order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is key mixing?

A

Output of 48b expansion. Phase XORed with the particular 48b round key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is substitution?

A

Every 6bits of the phase 3 output is substituted for a 4b output from sbox 1-8 depending on location of the 6b. Uses s-boxes. Results in 32bit output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is permeatation ?

A

32b block permeated using p matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does AES use that DES doesn’t ?

A

Does not use a deist all structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When did AES replace DES?

A

2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AES based on ?

A

Rinjdael algorithm. (Suite of algorithms that operate on different block and key sizes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many rounds in AES?

A

Number of rounds is based on key size.

128b - 10 rounds
192b - 12 rounds
256b - 14 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What differentiates the key sizes in AES?

A

Each key size algorithm is slightly different. Substitutions and permeatations operate on byte level.

17
Q

What are the steps of AES?

A
  1. Key expansion
  2. Initial round
  3. Sub steps for rounds 1-9, 11, 13
    A. Sub bytes
    B. Shift rows
    C. Mix columns
    D. Add round key
  4. Make algorithm reversible
    A. Sub bytes
    B. Shift rows
    C. Add round key.
18
Q

What is the finite field theorem ?

A

Finite field exists only if they have p^m elements, where p is prime and m is a positive integer