Crypto - 2A. Symmetric Design Flashcards
What is the purpose of bit transposition in cryptography?
To reorder bits within a set according to a defined permutation without changing individual bit values.
Fill in the blank: A bit transposition is a type of ______ but not vice-versa.
Permutation
How does a bit transposition differ from a general permutation?
A bit transposition only reorders bits, while a permutation can map any bit position to any value, making it more flexible.
Give an example of bit transposition in cryptographic algorithms.
DES uses Initial Permutation (IP) and specific transpositions within its rounds.
What is the purpose of ShiftRows in AES?
ShiftRows is a bit transposition operation in AES that shifts rows to provide diffusion.
Define linearity in cryptographic functions.
A function is linear if it satisfies f(x ⊕ y) = f(x) ⊕ f(y) for all inputs x and y.
Fill in the blank: A function is affine if it is linear with an additional ______ term.
Constant
Explain why linear functions are not ideal for encryption.
Linear functions produce predictable patterns, making them insecure for encryption without additional complexity.
What is non-linearity in cryptographic functions?
Non-linearity means that a function does not follow linear or affine patterns, which helps increase security by making outputs less predictable.
Provide an example of a non-linear function in cryptography.
The AND function, f(a, b) = a ⋅ b, is non-linear as it does not satisfy f(x ⊕ y) = f(x) ⊕ f(y).
Define diffusion in cryptographic terms.
Diffusion ensures that one input bit affects multiple output bits, spreading information and increasing security.
Fill in the blank: Diffusion is achieved when an input bit influences ______ output bits.
Multiple
Why is diffusion important in encryption?
Diffusion helps scatter information across the output, making it harder to deduce the input from the output.
Explain the bend-mix-notch-shuffle approach in symmetric cryptography.
A sequence that applies non-linearity (bend), linear mixing (mix), symmetry-breaking (notch), and bit reordering (shuffle) to strengthen encryption.
Who developed the bend-mix-notch-shuffle approach?
Joan Daemen