Chapter2 Flashcards

1
Q
  • The universal technique for providing confidentiality for transmitted or stored data
  • Also referred to as conventional encryption or single key encryption
A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two requirements for secure use:

A
  • Need a strong encryption algorithm

- Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two ways to attack Symmetric Encryption

A
  • Cryptanalytic Attacks

- Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyptanalytic Attacks rely on:

A
  • Nature of the algorithm
  • Some knowledge of the general characteristics of the plaintext
  • Some sample plaintext-cipertext pairs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used

A

Crytanalytic Attacks:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute-force attack

A

Try all possible keys on some ciphertext until an intelligible translation into plaintext is obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Encryption Standard (DES)

A
  • The most widely used encryption scheme

- Most studied encryption algorithm in existence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES strength concerns:

A
  • concerns about algorithm
  • Uses 56-bit key
  • EFF(Electronic Frontier foundation) announced in July 1998 that it had broked a DES encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Triple DES (3DES)

A
  • Repeats basic DES algorithm three times using either two or three unique keys
  • First standardized for use in financial applications in ANSI standard X9.17 in 1985
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attractions in 3DES

A
  • 168-bit key length overcomes the vulnerability to brute-force attack of DES
  • Underlying encryption algorithm is the same as in DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawback of 3DES

A
  • Algorithm is sluggish in software

- Uses a 64-bit block size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Encryption Standard (AES)

A
  • have security strength equal to or better than 3DES
  • improved efficiency
  • symmetric block cipher
  • 128 bit data and 128/192/256 bit keys
  • Published as FIPS 197
  • Rijndael
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Practical Security Issues:

A
  • Typical symmetric encryption is applied to a unit of data larger than a single 64-bit or 128-bit block
  • Electronic codebook (ECB) mode is the simplest approach to multiple-block encryption which is not secure
  • Modes of operation instead of ECB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Electronic CodeBook (ECB)

A
  • Each block of plaintext is encrypted using the same key

- Cryptanalyst may be able to exploit regularities in the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modes of operation

A
  • Alternative technique to increase security

- overcame weakness of ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block Cipher

A
  • Processes the input once block of elements at a time
  • Produces an output block for each input block
  • Can reuse keys
  • More common
17
Q

Stream cipher

A
  • Processes the input elements continuously
  • Produces output one elements at a time
  • Primary advantage is that they are almost always faster and use far less code
  • Encrypts plaintext one byte at a time
  • Pseudorandom stram is one that is unpredictable without knowledge of the input key
18
Q

Hash Function Requirements

A
  • can be applied to a block of data of any size
  • produces a fixed-length output
  • H(x) is relatively easy to compute for any given x
  • One-way or pre image resistant
  • Computationally infeasible to find find y ≠ x such that H(y) = H(x)
  • Collision resistant or strong collision resistance
19
Q

Two ways to attack Hash Function

A

Cryptanalysis and Brute-force

20
Q

SHA

A

most widely used hash algorithm

21
Q

hash function applications

A
  • passwords

- intrusion detection

22
Q

Public key encryption structure

A
  • Based on mathematical function
23
Q

Asymmetric Encryption

A
  • Uses two separate keys

- public key and private key

24
Q

Plaintext

A
  • Readable message or data that is fed into the algorithm as input
25
Q

Encryption Algorithm

A
  • Performs transformations on the plaintext
26
Q

Public and private key

A
  • pair of keys
27
Q

Ciphertext

A
  • scrambled message produced as output
28
Q

decryption key

A
  • Produces the original plaintext
29
Q

Asymetric encyption algorithms

A
  • RSA (Riverst, Shamir, Adleman)
  • Diffie-Hellman key exchange
  • Digital Signature Standard (DSS)
  • Elliptic Curve Cryptography (ECC)