Crypto - 2A. Symmetric Design Flashcards

1
Q

What is the purpose of bit transposition in cryptography?

A

To reorder bits within a set according to a defined permutation without changing individual bit values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill in the blank: A bit transposition is a type of ______ but not vice-versa.

A

Permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a bit transposition differ from a general permutation?

A

A bit transposition only reorders bits, while a permutation can map any bit position to any value, making it more flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of bit transposition in cryptographic algorithms.

A

DES uses Initial Permutation (IP) and specific transpositions within its rounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of ShiftRows in AES?

A

ShiftRows is a bit transposition operation in AES that shifts rows to provide diffusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define linearity in cryptographic functions.

A

A function is linear if it satisfies f(x ⊕ y) = f(x) ⊕ f(y) for all inputs x and y.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: A function is affine if it is linear with an additional ______ term.

A

Constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain why linear functions are not ideal for encryption.

A

Linear functions produce predictable patterns, making them insecure for encryption without additional complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is non-linearity in cryptographic functions?

A

Non-linearity means that a function does not follow linear or affine patterns, which helps increase security by making outputs less predictable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provide an example of a non-linear function in cryptography.

A

The AND function, f(a, b) = a ⋅ b, is non-linear as it does not satisfy f(x ⊕ y) = f(x) ⊕ f(y).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define diffusion in cryptographic terms.

A

Diffusion ensures that one input bit affects multiple output bits, spreading information and increasing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Diffusion is achieved when an input bit influences ______ output bits.

A

Multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is diffusion important in encryption?

A

Diffusion helps scatter information across the output, making it harder to deduce the input from the output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the bend-mix-notch-shuffle approach in symmetric cryptography.

A

A sequence that applies non-linearity (bend), linear mixing (mix), symmetry-breaking (notch), and bit reordering (shuffle) to strengthen encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who developed the bend-mix-notch-shuffle approach?

A

Joan Daemen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the ‘bend’ step in the bend-mix-notch-shuffle sequence?

A

To apply a non-linear mapping that introduces initial complexity in the transformation.

17
Q

Fill in the blank: The ‘mix’ step in the bend-mix-notch-shuffle sequence ensures ______ across bits.

A

Diffusion

18
Q

What does the ‘notch’ step achieve in the bend-mix-notch-shuffle process?

A

The notch step breaks symmetry, reducing predictability in the function.

19
Q

What is the function of the ‘shuffle’ step in symmetric encryption design?

A

The shuffle step reorders bits, ensuring that diffusion spreads globally across the output.

20
Q

Why are linear, affine, and non-linear functions combined in symmetric cryptography?

A

To balance simplicity and complexity, providing both efficiency and security in encryption functions.

21
Q

How does the KECCAK-f algorithm use bit transposition?

A

KECCAK-f employs the π (pi) bit transposition and ρ (rho) rotation to achieve secure mixing of bits.

22
Q

Fill in the blank: In symmetric cryptography, ______ helps each bit in the output depend on all input bits.

A

Global Dependency

23
Q

Why are multiple rounds used in symmetric encryption?

A

Multiple rounds increase complexity, making it harder for attackers to analyze or predict outputs.