Chp 2 Flashcards

1
Q

Secret Key Encryption (Symmetric)

A

Makes use of a secret key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the challenge with secret keys?

A

How to securely transport them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Diffie-Hellman

A

Widely used key exchange algorithm used for secret key transport in symmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two types of symmetric encryption?

A

Block and Stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between symmetric Block and Stream encryption?

A

Symmetric Block encryption groups data into a block and encrypts the individual block. Symmetric Stream encryption encrypts one bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where is symmetric stream encryption typically applied and why?

A

In real-time applications, it is much faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is padding?

A

Filling the block to operating size, before encryption, when the data does not fit perfectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do symmetric block ciphers manage?

A

How blocks of data are processed through block cipher mode implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

S-Box

A

Uses input and look-up tables to perform substitutions for ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Work Factor

A

The amount of time it takes to crack a cipher with the given computational power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SALT

A

Adding an IV to the ciphering process to change its operation and ensure that the ciphertext does not give the plaintext when played back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the Block Cipher Mode?

A

To outline how the blocks will be handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic Code Book (ECB)

A

Weak and insecure, each block is processed separately, and no SALT/IV is added so the ciphertext output will be the same every time the same plaintext is used as input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cipher Block Chaining (CBC)

A

Similar to ECB with the implementation of an IV. Results from the previous block are XOR’d with plaintext of the current block. That result is input to the encryption of the current block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cipher Feedback (CFB)

A

Converts the block cipher into a self-synchronizing stream cipher. The current block takes the output of the XOR process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Output Feedback (OFB)

A

Converts the block cipher to a synchronous stream output. The current block takes the output from the cipher stage (vs the XOR stage).

17
Q

Counter Mode (CTR)

A

Converts the block cipher into a stream cipher. Encrypts a counter value and nonce to XOR with the plain text block. Each block is processed independently, allowing parallel processing of blocks.