Chapter 3 Symmetric Key Crypto Flashcards

1
Q

what are the two sub ciphers in symmetric key crypto?

A

stream cipher and block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a stream cipher?

A

based on a one time pad
the key is short
key is stretched into a long KEYSTREAM
keystream is used just like a one time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the sub contents of block cipher

A

confusion and diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a block cipher?

A

based on codebook concept
each key yields a different codebook
employs both confusion and diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the two sub contents in Stream ciphers?

A

A5/1 algorithm and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is A5/1 algorithm

A

it is based on shift registers, used in GSM mobile phone system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is RC4

A

based on a changing lookup table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

for A5/1

A
uses 3 shift registers
x: 19 bits
y: 22 bits
z: 23 bits
and at each step you take the major
and use XOR
efficient in HARDWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is RC4

A
self modifying look up table
permutation of byte values 0.1.///255
swap elements in current lookup table 
select a keystream byte from table
efficient in SOFTWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Famous man in stream cipher

A

shamir the death of stream ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a round function

A

ciphertext is obtained from plaintext by iterating a round function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the input of the round function

A

input consists of key and output of previous round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a Feistel cipher

A
a type of block cipher
splitting the plain text left and right halves
F round function
K subkey
XOR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is DES

A

Data Encryption Standard

NSA secretly involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stream ciphers..

A

idea of one time pad,we trade provable security for relatively small and manageable key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stream ciphers is confusion or diffusion

A

confusion only

17
Q

block ciphers…

A

classic code book ciphers

key determines the code book

18
Q

block ciphers is confusion or diffusion

A

employ both confusion and diffusion

19
Q

DES is

A

block cipher standards

20
Q

what is a stream cipher

A

it takes a key K of n bits in length and stretches it into a long keystream
This keystream is then XORed with the plaintext P to produce cipher text C

21
Q

What is ECB

A

Electronic Codebook

22
Q

what is Electronic Codebook

A
each block encrypted independently
identical plaintexts are encrypted similarly
no chaining, no error propagation
does not hide data patterns
alice doesn't like it
23
Q

what is CBC

A

Cipher block Chaining

24
Q

what is cipher block chaining

A

allows random access to cipher text
changing IV or the first plaintext block results in different cipher text
Error propagation
iv need not be secret but its integrity should be protected

25
Q

what is CTR

A

counter

26
Q

What is the CTR counter cipher

A

no chaining dependencies

no error propagation

27
Q

what is Feistel cipher

A

The input is broken into two equal size blocks, Left and Right, which are then repeatedly cycled through the algorithm. each cycle, a hash function F is applied to the right block and the key, and the result of the hash is XOR-ed into the left block. The blocks are then swapped. The XOR-ed result becomes the new right block and the unaltered right block becomes the left block. the process is then repeated a number of times

28
Q

what is DES

A

Data Encryption Standard

29
Q

what is Data encryption Standard

algorithm?

A

it is a Feistel type substitution permeation
16 cycle Feistel system
56 key permuted into
16 rounds
48 sub keys one for each cycle
L and R blocks are 32 bits each yielding an overall block of 64 bits
S-boxes 32 bit data block and one 48subkeys as input
output 32 bits of output

30
Q

what is 3DES

A

Triple DES

31
Q

what is the Triple DES?

A

it was developed to address the obvious flaws in DES. it extends the key size of DES by applying the algorithm three times with three different keys. so NO brute force

32
Q

what is AES

A

Advanced Encryption Standard

33
Q

who is AES by

A

by Rijndael