Crypto Study 2 Flashcards
- What does ECB stand for?
- How does ECB work
- Name security flaw(s),
- What algorithm is it part of?
- Electronic Codebook
- Encrypts 64 bit blocks with the same secret key
- Subject to eavesdropping
- DES
1. How does CBC work?
2. Name a security flaw or issue.
3. What algorithm is it part of?
4. What does CBC stand for?
- Each block of unencrypted text is XORed with the block of ciphertext immediatley preceding it before its encrypted with DES. CBC also implements a IV and XORs the first block of the message producing a unique output. IV must be sent to recipient in plaintext,
- If one block is corrupted errors propogate making decryption impossible
- DES
- Cipher Block Chaining Mode
1. How does CFB work
2. Name security flaw(s),
3. What algorith is it part of?
4. What does CFB stand for?
- Streaming version of CBC. XORs and uses IV. Uses memory buffers the same block size instead of breaking the message into blocks. As buffer becomes full it gets encrypted. Uses real time data (done in the buffer) and uses IV and chaining.
- Errors propogate
- DES
- Cipher Feedback Mode
1. How does OFB work?
2. Name security flaw(s) or advantages,
3. What algorith is it part of,?
4. What does OFB stand for?
- XORs plaintext with a seed value. For first block IV is used to create seed value and then running DES. Future seed values are derived by running DES on previous seed values.
- No chaining function- errors do not propogate to affect decryption
- DES
- Output Feedback Mode
1. How does CTR work
2. Name security flaw(s).
3. What algorith is it part of,?
4. What does CTR stand for?
- Stream cipher similiar to CFB. Similar to CFB but does not use a seed value, uses a counter that increments for each operation.
- Uses chaining so may propogate errors
- DES
- Counter Mode
- What is IDEA?,
- How does it work?
- What modes is it capable of operating in?
- What secure e-mail package is based off of IDEA?
- International Data Encryption Algorithm
- Operates on 64 bit block of text, begins with a 128 bit key, broken into fifty -two 16 bit subkeys which act on input text with XOR and Modulus operations to produce encrypted/decrypted versions of the input message
- Same modes as DES: ECB, CBC, CFB, OFB, CTR
- PGP- Pretty Good Privacy
1. Is BLOWFISH Symmetric or Assymetric?
2. What is the block size when encrypting?
3. How many bits is the key length?
4. What are its advantages?
- It is a SYMMETRIC cryptographic alogrithm
- Works on 64 bit BLOCKS of text
- Allows variable key lengths from 32 to 448 bits
- Faster than IDEA and DES
- Is Skipjack Symmetric or Asymmetric?
- How does it work?
- What does it support that is unique?
- A symmetric encryption algorithm
- Works on 64 bit-blocks of text. Uses an 80 bit key and supports the four modes of operation of DES (CBC, OFB, ECB, CTR)
- Supports escrow of encryption keys- NIST and Dept. of Treasury have the keys
- What is RC5?
- Block cipher or stream cipher?
- What are the key sizes it supports?
- What are the security implications of the algorithm?
- Rivest Cipher 5, a symmetric algorithm
- It is a variable block cipher 32, 64, or 128 bits
- Uses key sizes 0 to 2,040 bits
- 64 bit key took 4 years to crack a single message
- What is AES?
- Name the three key sizes and the round of encryption associated with each?
- Advanced Encryption Standard/Rijndael (Symmetric Encyption)
- 128 bit key=10 rounds of encryption
192 bit key= 12 rounds of encryption
256 bit key= 14 rounds of encryption
- What is TWOFISH?
- How does it work
- What two special techniques does it apply to its encryption??
- It’s a block AES cipher
- It operates on 128 bit blocks of data and uses keys up to 256 bits
- Does PREWHITENING- XORing the plaintext witha subkey before first round of encryption, THEN does POSTWHITENING which a similar operationn but done aftet the 16 th round of encryption
In regards to SYMMETRIC KEY management, what are three methods to accomplish?
1. Offline distribution- Has to be physically provided
2. Public Key Encryption- Used to set up the initial communication link- then the parties switch to Private Key encryption which is faster.
3. Diffie-Hellman- use when there is no offline or public key encryption is available- random large integers selected and calculations performed- each party uses their integers to produce a result and exchange to verify they got the same results
What are the key lengths of:
RSA
DSA
Elliptic Curve
RSA= 1,024
DSA=1,024
Elliptic Curve=160 bits
In Publick Key Cryptography, Bob wants to send a message to Sue, what does
he use to encrypt the message and how does Sue Decrypt the message?
Bob uses Sue’s Public Key to encrypt the message. Sue uses her
Private Key to decrypt the message.
- What type of encryption algorithm is RSA?
- What does the system depend on for the strength of its security?
- What will be the largest value?
- RSA is a Public Key cryptosystem
- It depends upon the difficulty of factoring large prime numbers
- n will always be the largest value if the choice is between p and q