Chapter 6 - Cryptography And SYmmetric Key Algorithms Flashcards
Modulo function
The module function is just as important to cryptography as the logical operations are. For example, 8 mod 6 = 2
Codes vs Ciphers
Codes work on words and phases whereas ciphers work on individual characters and bits.
Differences between Caesar cipher, Vigenere cipher, and one-time pad.
The only differences are key length.
The Caesar shift cipher uses a key length one, the Vigenere cipher uses a longer value (usually a word or sentence), and the one-time pad uses a key that is as long as the message itself.
DES
DES uses a 54-bit key to drive the encryption and decryption process.
However, the DES specification calls for a 64-bit key. The remaining 8 bits are supposed to contain parity information to ensure that the other 56 bits are accurate.
Counter mode (CTR) of DES
CTR mode allows you to break an encryption or decryption operation into multiple independent steps. This makes CTR mode well suited for use in parallel computing.
RC5
Rivest Cipher 5, or RC5, is a symmetric algorithm patented by Rivest, Shamir, and Adleman (RSA) Data Security. RC5 is a block cipher of variable block sizes (32, 64, or 128 bits) that uses key sizes between 0 length and 2,040 bits.
S-RPC
Secure RPC (S-RPC) employs Diffie-Hellman for key exchange.
Which type of crypto system can provide nonrepudiation?
Nonrepudiation provides the assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender.
Secret key, or symmetric key, cryptosystems do not provide this guarantee. If Jim and Bob participate in a secret system communication system, they can both produce the same encrypted message using their shared secret key.
Definition of M of N Control
If only a single key escrow recovery agent exists, there is opportunity for fraud and abuse of this privilege.
M of N Control requires that a minimum number of agents (m) out of the total number of agents (n) work together to perform high-security tasks.
Major advantage of OFB (Output Feedback Mode)
In OFB mode, DES XORs the plain text with a seed value. For the first encrypted block, an initialization vector is used to create the seed value. The major advantage of OFB mode are there is no chaining function and transmission error do not propagate to affect the decryption of future blocks.
One-Way Functions
A one-way function is a mathematical operation that easily produces output values for each possible combinations of input but makes it impossible to retrieve the input values. It rely on the difficulty of factoring the product of large prime numbers.
Advanced Encryption Standard block sizes and key strength sizes
AES only allows the processing of 128-bit blocks.
But AES cipher allows the use of three strengths: 128 bits, 192 bits, and 246 bits.
Running Key Ciphers
Running key cipher, the encryption key is as long as the message itself and is often chosen from a common book.
Twofish Algorithm
The Twofish algorithm developed by Bruce Schneier was another one of the AES finalists.
Twofish uses two techniques not found in other algorithms:
- Prewhiting involves XORing the pain text with a separate subkey before the first round of encryption.
- Postwhitening uses a similar operation after the 16th round of encryption.
The Data Encryption Standard (DES) encryption algorithm characteristics?
DES works with 64 bit blocks of text using a 64 bit key (with 8 bits used for parity, so the effective key length is 56 bits).
Some people are getting the Key Size and the Block Size mixed up.
The block size is usually a specific length. For example DES uses block size of 64 bits which results in 64 bits of encrypted data for each block. AES uses a block size of 128 bits, the block size on AES can only be 128 as per the published standard FIPS-197.
PGP uses which of the following to encrypt data?
Notice that the question specifically asks what PGP uses to encrypt. For this, PGP uses a symmetric key algorithm. PGP then uses an asymmetric key algorithm to encrypt the session key and then sends it securely to the receiver. It is a hybrid system where both types of ciphers are being used for different purposes.
Whenever a question talks about the bulk of the data to be sent, Symmetric is always best to choice to use because of the inherent speed within Symmetric Ciphers. Asymmetric ciphers are 100 to 1000 times slower than Symmetric Ciphers.
Which public key algorithm does both encryption and digital signature?
RSA can be used for encryption, key exchange, and digital signatures.
What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?
Key clustering happens when a plaintext message generates identical ciphertext messages using the same transformation algorithm, but with different keys.
Also means one key is used to encrypt two different messages and they both end up with the same cipher text.