Chapter 6 - Cryptography And SYmmetric Key Algorithms Flashcards

1
Q

Modulo function

A

The module function is just as important to cryptography as the logical operations are. For example, 8 mod 6 = 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Codes vs Ciphers

A

Codes work on words and phases whereas ciphers work on individual characters and bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differences between Caesar cipher, Vigenere cipher, and one-time pad.

A

The only differences are key length. The Caesar shift cipher uses a key length one, the Vigenere cipher uses a longer value (usually a word or sentence), and the one-time pad uses a key that is as long as the message itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DES

A

DES uses a 54-bit key to drive the encryption and decryption process. However, the DES specification calls for a 64-bit key. The remaining 8 bits are supposed to contain parity information to ensure that the other 56 bits are accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Counter mode (CTR) of DES

A

CTR mode allows you to break an encryption or decryption operation into multiple independent steps. This makes CTR mode well suited for use in parallel computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RC5

A

Rivest Cipher 5, or RC5, is a symmetric algorithm patented by Rivest, Shamir, and Adleman (RSA) Data Security. RC5 is a block cipher of variable block sizes (32, 64, or 128 bits) that uses key sizes between 0 length and 2,040 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

S-RPC

A

Secure RPC (S-RPC) employs Diffie-Hellman for key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of crypto system can provide nonrepudiation?

A

Nonrepudiation provides the assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender. Secret key, or symmetric key, cryptosystems do not provide this guarantee. If Jim and Bob participate in a secret system communication system, they can both produce the same encrypted message using their shared secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of M of N Control

A

If only a single key escrow recovery agent exists, there is opportunity for fraud and abuse of this privilege. M of N Control requires that a minimum number of agents (m) out of the total number of agents (n) work together to perform high-security tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major advantage of OFB (Output Feedback Mode)

A

In OFB mode, DES XORs the plain text with a seed value. For the first encrypted block, an initialization vector is used to create the seed value. The major advantage of OFB mode are there is no chaining function and transmission error do not propagate to affect the decryption of future blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One-Way Functions

A

A one-way function is a mathematical operation that easily produces output values for each possible combinations of input but makes it impossible to retrieve the input values. It rely on the difficulty of factoring the product of large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Encryption Standard block sizes and key strength sizes

A

AES only allows the processing of 128-bit blocks, but AES cipher allows the use of three strengths: 128 bits, 192 bits, and 246 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Running Key Ciphers

A

Running key cipher, the encryption key is as long as the message itself and is often chosen from a common book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Twofish Algorithm

A

The Twofish algorithm developed by Bruce Schneier was another one of the AES finalists.

Twofish uses two techniques not found in other algorithms:

  • Prewhiting involves XORing the pain text with a separate subkey before the first round of encryption.
  • Postwhitening uses a similar operation after the 16th round of encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Data Encryption Standard (DES) encryption algorithm characteristics?

A

DES works with 64 bit blocks of text using a 64 bit key (with 8 bits used for parity, so the effective key length is 56 bits).
Some people are getting the Key Size and the Block Size mixed up. The block size is usually a specific length. For example DES uses block size of 64 bits which results in 64 bits of encrypted data for each block. AES uses a block size of 128 bits, the block size on AES can only be 128 as per the published standard FIPS-197.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PGP uses which of the following to encrypt data?

A

Notice that the question specifically asks what PGP uses to encrypt. For this, PGP uses a symmetric key algorithm. PGP then uses an asymmetric key algorithm to encrypt the session key and then sends it securely to the receiver. It is a hybrid system where both types of ciphers are being used for different purposes.

Whenever a question talks about the bulk of the data to be sent, Symmetric is always best to choice to use because of the inherent speed within Symmetric Ciphers. Asymmetric ciphers are 100 to 1000 times slower than Symmetric Ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which public key algorithm does both encryption and digital signature?

A

RSA can be used for encryption, key exchange, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?

A

Key clustering happens when a plaintext message generates identical ciphertext messages using the same transformation algorithm, but with different keys.

Also means one key is used to encrypt two different messages and they both end up with the same cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Rijandel block length and key length

A

Rijndael and AES differ only in the range of supported values for the block length and cipher key length.

For Rijndael, the block length and the key length can be independently specified to any multiple of 32 bits, with a minimum of 128 bits, and a maximum of 256 bits.

AES fixes the block length to 128 bits, and supports key lengths of 128, 192 or 256 bits only.

20
Q

Cryptography does NOT help in which area?

A

Cryptography is a detective control in the fact that it allows the detection of fraudulent insertion, deletion or modification. It also is a preventive control is the fact that it prevents disclosure, but it usually does not offers any means of detecting disclosure.

21
Q

Confusion

A

In the Block Cipher method called Confusion, the relationship between the plaintext and key are so complicated that the attacker can’t alter the plaintext in an attempt to determine the key used to encrypt the plaintext.

22
Q

Differences between confusion and diffusion.

A

A strong cipher contains the right level of two main attributes: confusion and diffusion. Confusion is commonly carried out through substitution, while diffusion is carried out by using transposition. For a cipher to be considered strong, it must contain both of these attributes to ensure that reverse-engineering is basically impossible. The randomness of the key values and the complexity of the mathematical functions dictate the level of confusion and diffusion involved.

23
Q

What is FIPS-140 standard used for?

A

Hardware and software cryptographic modules
The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. As of December 2006, the current version of the standard is FIPS 140-2, issued on 25 May 2001.

24
Q

Block ciphers

A

Block ciphers do not use public cryptography (private and public keys).

Block ciphers is a type of symmetric-key encryption algorithm that transforms a fixed-size block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length. They are appropriate for software implementations and can operate internally as a stream. See more info below about DES in Output Feedback Mode (OFB), which makes use internally of a stream cipher.

25
Q

Running Cipher

A

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. Usually, the book to be used would be agreed ahead of time, while the passage to be used would be chosen randomly for each message and secretly indicated somewhere in the message.

26
Q

Diffie-Hellman

A

The Diffie-Hellman key agreement protocol (also called exponential key agreement) was developed by Diffie and Hellman [DH76] in 1976 and published in the ground-breaking paper “New Directions in Cryptography.” The protocol allows two users to exchange a secret key over an insecure medium without any prior secrets.

27
Q

Stream Cipher

A

stream cipher generates what is called a keystream
A stream cipher is a type of symmetric encryption algorithm that operates on continuous streams of plain text and is appropriate for hardware-based encryption.
Stream ciphers can be designed to be exceptionally fast, much faster than any block cipher. A stream cipher generates what is called a keystream (a sequence of bits used as a key).
Stream ciphers can be viewed as approximating the action of a proven unbreakable cipher, the one-time pad (OTP), sometimes known as the Vernam cipher. A one-time pad uses a keystream of completely random digits. The keystream is combined with the plaintext digits one at a time to form the ciphertext. This system was proved to be secure by Claude Shannon in 1949. However, the keystream must be (at least) the same length as the plaintext, and generated completely at random. This makes the system very cumbersome to implement in practice, and as a result the one-time pad has not been widely used, except for the most critical applications.
A stream cipher makes use of a much smaller and more convenient key — 128 bits, for example. Based on this key, it generates a pseudorandom keystream which can be combined with the plaintext digits in a similar fashion to the one-time pad. However, this comes at a cost: because the keystream is now pseudorandom, and not truly random, the proof of security associated with the one-time pad no longer holds: it is quite possible for a stream cipher to be completely insecure if it is not implemented properly as we have seen with the Wired Equivalent Privacy (WEP) protocol.
Encryption is accomplished by combining the keystream with the plaintext, usually with the bitwise XOR operation.

28
Q

Modes of DES Summary

A

Pg 144 Eric book

29
Q

Zero Knowledge Proof

A

Someone tells you something without telling you more information than you need to know. In cryptography it means that you have a specific key without sharing the key or showing it to anyone.

30
Q

What kind of Encryption technology does SSL utilize?y

A

Hybrid
SSL use public-key cryptography to secure session key, while the session key (secret key) is used to secure the whole session taking place between both parties communicating with each other.

31
Q

Electronic Code Book mode of DES encryption

A

Electronic Code Book (ECB) is the simplest and weakest form of DES. It uses no initialization vector or chaining. Identical plaintexts with identical keys encrypt to identical ciphertexts. Two plaintexts with partial identical portions (such as the header of a letter) encrypted with the same key will have partial identical ciphertext portions.

32
Q

Entropy

A

Entropy is a measure of the randomness of data collected by an application or an operating system and used to create a cryptography key. While having a random key is a good start, the key must also remain.

33
Q

Block ciphers perform substitution by using which of the following?

A

Substitution boxes, or S-boxes, are used within block ciphers. They use lookup table to determine how a block of data is encrypted or decrypted. The key is used to decide which S-box to utilize with each block.

34
Q

A key stream generator is used in what type of cipher?

A

Stream cipher. Keystream generators are used in stream ciphers to produce a random stream of bits. These bits are XORed to the message, which results in an encrypted message (cipher text). The keystream generator is similar to the one-time pad concept.

35
Q

IDEA

A

IDEA is a block cipher that uses a 128-bit key. It uses a 64-bit block that is broken down into 16 sunblocks and then sent through eight rounds of permutations.

IDEA was actually thought to be the next DES algorithm but because it was patented and required licensing fees, it was not adopted.

36
Q

Knapsack

A

Knapsack is an asymmetric algorithm.

37
Q

Least Significant bit (LSB)

A

LSB is the bit position in a binary integer. The LSB is sometimes referred to as the rightmost bit, due to the convention in positional notation of writing less significant digits further to the right. In the following bits 11111110, the LSB is 0.

38
Q

CBC

A

Cipher Block Chaining (CBC), chains blocks of messages together so that the encryption process will look different each time. Without CBC, if a message were encrypted and decrypted over and over, patterns will begin to surface. However,CBC attaches previous blocks onto the next current block, which means that the result will always be different.

This is way of adding more randomness to the process of encryption.

39
Q

MD2

A

128 bit hash value

40
Q

ECB

A

ELectronic Code Block does not using any chaining. This means that the same plaintext will create the same cipher text every time it is encrypted with the same key. Which means DES is typically used when small amounts of data are encrypted, such as tam and PIN numbers.

41
Q

Concealment Cipher

A

Concealment ciphers, also called null cipher, disguise messages within the text or body of a message, such as using every other word in a sentence to form a different message.

42
Q

Message authentication code

A

MAC is the use of a symmetric key and a hashing algorithm. The only party that could properly check the integrity of the message is the one that has the other copy of the symmetric key.

43
Q

Steganography components

A

The carrier file is a file that has information hidden inside of it.
The stego-medium is the medium in which the information is hidden.
The payload is the information that is to be concealed.

44
Q

Cryptography vs Cryptanalysis vs Cryptology

A

Cryptography – Study of encrypting messages

Cryptanalysis – Study of decrypting messages

Cryptology – Study of the mathematics behind encryption/decryption

45
Q

Cryptovariable is another name for a key.

A

N/A

46
Q

Caesar algorithm

A

In the Caesar algorithm the alphabet serves as the algorithm and the key is the number of locations that are shifted during the encryption and decryption process.

47
Q

Concealment cipher vs steganography

A

Concealment ciphers disguise messages within the text or body of a message, such as using every other word in a sentence to form a different message.
Steganography hides messages within the slack bits of pictures, music files, etc.