Crypto - 2. Secret Flashcards

1
Q

What is a secret key used for in cryptography?

A

A secret key is used to encrypt and decrypt data securely between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three methods for distributing a secret key.

A

Hand-to-hand, smart card, or a key establishment scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a stream cipher?

A

A stream cipher generates a keystream that is XORed with plaintext to encrypt or with ciphertext to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a Linear Feedback Shift Register (LFSR) work in cryptography?

A

An LFSR uses a feedback polynomial to generate a keystream, common in many stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: The ______ cipher is a well-known stream cipher that has faced vulnerabilities.

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main difference between a block cipher and a stream cipher?

A

A block cipher encrypts fixed-size blocks of data, while a stream cipher encrypts data bit by bit using a keystream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a block cipher.

A

A block cipher is a mapping that encrypts fixed-size data blocks using a secret key, with a reversible function for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a pseudo-random permutation (PRP) in block ciphers ensure?

A

PRP ensures the block cipher output is indistinguishable from a random permutation without the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: The ______ cipher was one of the first standardized block ciphers, based on a Feistel network structure.

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Triple-DES and its key strength.

A

Triple-DES applies DES encryption three times with different keys, resulting in a 112-bit or 168-bit key strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What was the goal of the Advanced Encryption Standard (AES) competition?

A

To find a secure block cipher to replace DES, with 128-bit block size and key sizes of 128, 192, and 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who developed the Rijndael cipher, later standardized as AES?

A

Joan Daemen and Vincent Rijmen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What field is used for finite field arithmetic in AES?

A

AES uses the Galois Field GF(2^8) for its arithmetic operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: The four main transformations in AES are _______, _______, _______, and _______.

A

SubBytes, ShiftRows, MixColumns, and AddRoundKey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Electronic Codebook (ECB) mode?

A

ECB mode encrypts each plaintext block independently, which can reveal patterns in the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is ECB mode considered weak?

A

Because identical plaintext blocks produce identical ciphertext blocks, potentially revealing data patterns.

17
Q

What is Cipher Block Chaining (CBC) mode?

A

CBC mode XORs each plaintext block with the previous ciphertext block before encryption, creating block dependencies.

18
Q

How does Counter Mode (CTR) work in encryption?

A

CTR generates a keystream by encrypting sequential counters and XORs it with the plaintext.

19
Q

Fill in the blank: The ______ mode combines a block cipher with a message authentication scheme, ensuring both confidentiality and integrity.

A

Authenticated encryption mode (e.g., GCM or CCM)

20
Q

Define the Sponge Construction in cryptography.

A

A method for generating cryptographic hashes or keystreams by absorbing input and squeezing out the output.

21
Q

What is the role of the SpongeWrap construction?

A

It provides authenticated encryption by using the sponge construction for both keystream generation and MAC.

22
Q

Explain CBC-MAC.

A

A message authentication code created by encrypting each block of a message with CBC mode and using the final block as the MAC.

23
Q

What is a cryptographic permutation?

A

A bijective function that maps an input to an output in a reversible way, often used in cryptographic algorithms.

24
Q

What is a pseudo-random function (PRF)?

A

A function that provides unpredictable output, used in MACs and encryption for secure message authentication.

25
Q

Explain incremental MACs and their use case.

A

Incremental MACs provide authentication for large data streams, allowing for progressive MAC calculation.

26
Q

Why is peer review critical for cryptographic primitives?

A

To ensure robustness against new attacks and maintain confidence in security.

27
Q

What is a keyed sponge function?

A

A sponge function that incorporates a secret key, used to create a MAC or a stream cipher.

28
Q

Fill in the blank: AES operates with a block size of ______ bits and key sizes of _______, _______, or _______ bits.

A

128, 128, 192, or 256.

29
Q

Name two advantages of block ciphers over stream ciphers.

A

They are suitable for fixed-size data encryption and allow secure modes of operation for data integrity.

30
Q

What are the four main transformations in AES?

A

SubBytes, ShiftRows, MixColumns, and AddRoundKey.

31
Q

Fill in the blank: In Cipher Block Chaining (CBC) mode, each plaintext block is XORed with the ______ before encryption.

A

Previous ciphertext block.

32
Q

Define Counter Mode (CTR).

A

CTR mode encrypts sequential counter values to generate a keystream, which is then XORed with the plaintext.

33
Q

What is the role of the Galois Field in AES?

A

It enables secure finite field arithmetic necessary for transformations like MixColumns.

34
Q

Why is the Sponge construction considered flexible?

A

It can absorb any length of input and generate a secure keystream or hash of arbitrary length.

35
Q

What is the main advantage of authenticated encryption?

A

It provides both data confidentiality and integrity using encryption and authentication in one process.

36
Q

Explain the concept of a nonce in cryptography.

A

A unique, one-time value used in encryption to prevent identical ciphertexts for the same plaintext.