Chapter 20: Cryptographic Algorithms Flashcards
What is symmetric encryption?
Encryption based on substitution and transposition. Earliest form from ancient Egypt. Secret key shared by both parties.
What is asymmetric encryption ?
Encryption using a matermaticwlly related public and private key pair for encryption. Public key of the receiver is used to encrypt the senders message. Private key of receiver is used to decrypt the message.
What is DES?
Data encryption standard. 1970. Block cipher (takes several blocks at a time and encrypt block by block) based on lucifer cipher
What did the NSA add to DES?
S-boxes (substitution boxes). 1976. This decreased the key length.
Why was 3DES created?
To prevent attacks. Used 1,2 or 3 56b keys. It was designed to strengthen the algorithm and be backward compatible.
What is 3DES?
Strengthened DES. effective key sizes of 56, 112 or 168b. Two rounds of encryption. One round of decryption. Backward compatible.
What are the steps of the DES function?
- Expansion
- Key mixing
- Substitution
- Permutation
What is the expansion process of DES?
32b input to a 48b output. On nibble, duplicate partition bits. All other bits shift one to the right. Circular. Nibble partition bits duplicate twice in order.
What is key mixing?
Output of 48b expansion. Phase XORed with the particular 48b round key.
What is substitution?
Every 6bits of the phase 3 output is substituted for a 4b output from sbox 1-8 depending on location of the 6b. Uses s-boxes. Results in 32bit output.
What is permeatation ?
32b block permeated using p matrix
What does AES use that DES doesn’t ?
Does not use a deist all structure.
When did AES replace DES?
2001
What is AES based on ?
Rinjdael algorithm. (Suite of algorithms that operate on different block and key sizes)
How many rounds in AES?
Number of rounds is based on key size.
128b - 10 rounds
192b - 12 rounds
256b - 14 rounds