Chapter 6 Computer Security Flashcards

1
Q

What is the Feistel Cipher used for?

A

Feistel Cipher used in all symmetric block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the Feistel Cipher process.

A

Feistel Cipher processes is 1.divide the plaintext into two halves each half have rounds of transforming in each round will apply operations include subsitiotion ,xor then after finshed rounds will combared both halves together to get a cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does decryption work in Feistel Cipher?

A

Decryption is the same as encryption but uses the sub-keys in reverse order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What operations are applied in each round of the Feistel Cipher?

A

Substitution is applied in each round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the encryption structure in Feistel Cipher?

A

Left half is passed to the next round.
Right half is transformed with a function and XORed with the left half to create a new right half.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the advantage of the Feistel Cipher?

A

use one algorthim for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a block cipher?

A

a common symmatric encryption used by divied the plaintext into blocks with same length to produce a cyphertext with same length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three block ciphers discussed.

A

DES ,3DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DES mainly used for?

A

DES is mostly used in symmetric block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is DES vulnerable to brute force?

A

DES use 56bit of key length it susceptible to brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many rounds does DES use?

A

16 rounds use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What functions are used in DES?

A

Substitution ,bit shift, logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Triple DES (3DES)?

A

An improved version of DES, using either 2 or 3 keys for a key size of 112 or 168 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the downside of 3DES?

A

Slower,Small block size;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AES and how does it compare to DES and 3DES?

A

AES is more secure and efficent than des and 3des

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key lengths for AES?

A

128 or 192 or 256

16
Q

Describe the AES round functions.

A

Substitution bits ,row shifting ,column mix, round key

17
Q

How does AES ensure security?

A

AES is resistant to known attacks and offers high speed and efficiency.