Crypto Flashcards

1
Q

If a particular cipher uses 128 bit keys, and can be brute-forced in 100 years, how many years would it take to brute-force that same cipher if the keys are increased to 130 bits?

A

400

Power = KeySpace / Time where KS = 2exp-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statement is false?

a. Generally, symmetric ciphers are much faster than asymmetric ciphers.
b. The two major cipher types are block ciphers and stream ciphers.
c. Cryptanalysis is the process of brute-forcing keys.
d. Chaining used in conjunction with a block cipher enhances the strength of the encryption.

A

c. Cryptanalysis is the process of brute-forcing keys.

Cryptanalysis is the unwrapping of the algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In addition to intense public scrutiny/review, the dominant factor contributing to the security strength of most modern encryption ciphers is

a. key length
b. the secrecy of the underlying cipher algorithm
c. the use of parallelism to divide the key space
d. chaining to increase the time required to test each key

A

a. key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a given cipher algorithm uses 100 iterations of processing for a single block of plaintext and key, and each iteration i is dependent upon iteration i-1; then a single 800MHz CPU could check a theoretic-cal maximum of ______ keys per second. (assume no pipelining or other “tricks”)

A

8 million

800MHz (cycles/sec) and 100 keys/sec
=> 800x10exp6 cycles/sec / 100 keys/sec = 8x10exp6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these represent hashes (or hash “functions”)?

a. Human birthdates
b. Modulo arithmetic
c. Truncate function
d. All the above are examples of hashes

A

d. All the above are examples of hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Moore’s Law, approximately how much “faster” will computers be 30 years from now?

a. about 1,000 times faster
b. about 32,000 times faster
c. about 1,000,000 times faster
d. about 64,000,000 times faster

A

c. about 1,000,000 times faster

Py = Pnow x 2exp(y/1.5)
P30 = P0 x 2exp(30/1.5) = 1048576
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term “collision” when applied to hashing algorithms is best defined as

a. the size of the “fingerprint”.
b. two separate messages hashing to the same “fingerprint”.
c. a “fingerprint” that does not properly un-hash back to the original message.
d. a single message that hashes to two or more different “fingerprints”.

A

b. two separate messages hashing to the same “fingerprint”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proper management of public keys requires that they…

a. can be distributed without any protection
b. need to have their integrity protected in the form of a digital certificate
c. should be kept confidential
d. should be “signed” with the issuer’s public key

A

b. need to have their integrity protected in the form of a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital certificates…

a. contain the owner’s private key and are signed with the CA’s private key.
b. contain the owner’s private key and are signed with the CA’s public key.
c. contain the owner’s public key and are signed with the CA’s public key.
d. contain the owner’s public key and are signed with the CA’s private key.

A

d. contain the owner’s public key and are signed with the CA’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Briefly describe the two reasons that we cannot generally (i.e., for all types of message exchanges) rely on the “readability” of decrypted plaintext to ensure it has decrypted correctly.

  1. _________________________
  2. _________________________
A
  1. Non Human Reader

2. Non Human Readable Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the approximate bit-entropy of an 8 (decimal) digit PIN? [log2 = 0.3]

a. ~19
b. ~42
c. ~96
d. ~26

A

d. ~26

X = log(password space) / log2
=> X = 8 / 0.3
Check this!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a cipher has keys of length L, mathematically express the average number of keys that would have to be checked when conducting a brute-force attack before the correct key is identified.

a. Lexp2 – L/2
b. 2expL/2
c. 2expL-1
d. (L-1)exp2
A

c. 2expL-1

2expL (total KeySpace) / 2 (to find halfway point)
=> 2expL-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For any 2 of n users to be able to communicate securely, how many public keys would have to be distributed within this domain of n users? (Assume there is NO central public key server)

a. n
b. n-1 
c. n(n-1)	
d. n(n-1) / 2
A

c. n(n-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these is the “best compliment” to a cipher developer?

a. We could not discover how your cipher works.
b. Your cipher employs both substitution and transposition.
c. The entropy of your cipher results in complete “avalanche” effect. 	
d. The cheapest way to attack your cipher is to brute-force the key.
A

d. The cheapest way to attack your cipher is to brute-force the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which best describes Kerckhoff’s Principle?

a. The entire defense is the sum total of the synergy of each individual security control.
b. The implementation/design is open to public scrutiny and analysis.
c. All crypto ciphers must include both substitutions and transpositions.
d. Key entropy is maximized when all key combinations are “equally likely”.
A

b. The implementation/design is open to public scrutiny and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main purpose of a digital certificate?

a. To identify a user.
b. To bind an identity to a public key.
c. To store a digitized signature.
d. To store a CA’s private key.
A

b. To bind an identity to a public key.

17
Q

What is true about an item encrypted with Bob’s public key?

a. Anyone could decrypt it.
b. Only Bob could decrypt it.
c. Only Bob could have encrypted it.
d. The item would not have any confidentiality.
A

b. Only Bob could decrypt it.

18
Q

Which statement best describes this cryptographic protocol? (Note: As was done in class, assume all ciphers are good and no keys are compromised.)

a. This would provide both confidentiality and integrity for message M.
b. This would only provide confidentiality for message M.
c. This would provide confidentiality, and all aspects of integrity except for replay protection for message M.
d. This would only provide integrity protection for message M.

A

b. This would only provide confidentiality for message M.

19
Q

Which of these represents the desired property of a cipher, that results in large changes in ciphertext for even small changes in either the key or the plaintext?

a. Kerckhoff’s Principle
b. Bit-Entropy
c. Diffusion
d. Avalanche Affect
A

d. Avalanche Affect

20
Q

Assume a 64 bit key (with 64-bit entropy), a 12 iteration block cipher, an ASIC that is as efficient in processing this cipher as is possible, and which is driven by a 1GHz clock. On average, how long will it take to brute-force a key under these conditions?

a. 2exp63 x 12 / 10exp9
b. 2exp63 / (12 * 10exp9)
c. 2exp63 x 10exp9 * 12
d. (2exp63 x 10exp9) / 12

A

a. 2exp63 x 12 / 10exp9

T = (2exp(L-1) x Iteration Block) / CPU speed

21
Q

What is a One-Time Pad?

a. It’s a block cipher that can adjust block size to any size of plaintext.
b. It’s a key generation system that ensures complete randomness of generated keys.
c. It’s a key that is as long as the plaintext and is never re-used.
d. It’s a one-time password that is never re-used.

A

c. It’s a key that is as long as the plaintext and is never re-used.

22
Q

All modern block ciphers use a combination of…

a. substitution and diffusion.
b. transposition and substitution. 
c. permutation and obfuscation.
d. obfuscation and transposition.
A

b. transposition and substitution.

23
Q

What does the Strict Avalanche Criterion require?

a. Degree of ciphertext change should be similar in scale to degree of key or plaintext change.
b. Ciphertext should change nearly completely (~100%) for any key or plaintext change.
c. Degree of ciphertext change should be randomized as a function of key or plaintext change.
d. Ciphertext should change by nearly 50% for any sized change in key or plaintext.
A

d. Ciphertext should change by nearly 50% for any sized change in key or plaintext.

24
Q

Which of these represents the most thorough encryption with respect to where encryption is placed?

a. Gateway-to-gateway link encryption.
b. Gateway-to-gateway IPSec.
c. End-to-end link encryption.  
d. End-to-end SSL.
A

c. End-to-end link encryption.

25
Q

Which is false regarding link layer encryption?

a. It is typically done gateway-to-gateway vice end-to-end.
b. Can easily be done over public networks/internets.
c. Provides good protection against traffic analysis.
d. Encrypts layer 3 and above.

A

b. Can easily be done over public networks/internets.