Data Encryption Standard (DES) Flashcards

1
Q

Block Cipher Size?

A

64-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Size?

A

56-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does it work?

A

Long series of XOR operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many rounds?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Electronic Codebook Mode

A

Each time the algorithm processes a 64-bit block, it simply encrypts the block using the chosen secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECB Mode weakness?

A

If the algorithm encounters the same block multiple times it will produce the same encrypted block.

If an enemy were eavesdropping on the communications, they could simply build a “code book” of all the possible encrypted values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cipher Block Chaining Mode

A

Each block of unencrypted text is XORed with the block of ciphertext immediately preceding it before it is encrypted using the DES algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CBC Mode weakness?

A

If one block is corrupted during transmission it becomes impossible to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cipher Feedback Mode

A

Streaming cipher version of CBC.

CFB operates against data produced in real time. Uses memory buffers of the same same block size. As the buffer becomes full, it is encrypted and then sent to the recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CFB Mode weakness

A

If one block is corrupted during transmission it becomes impossible to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Output Feedback Mode

A

Operates in almost the same fashion as it does in CFB mode.

Instead of XORing an encrypted version of the previous block of ciphertext, DES XORs the plaintext with a seed value. Future seed values are derived by running the DES algorithm on the previous seed value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantage of OFB mode?

A

There is no chaining and transmission errors do not propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Counter Mode

A

Uses a stream cipher similar to that used in CFB and OFB modes.

Creates a seed value for each encryption/decryption operations from the results of the previous seed values, it uses a simple counter that increments for each operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantage of Counter mode?

A

Errors to do not propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Triple DES Modes?

A

DES-EEE3
DES-EEE2
DES-EDE2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DES-EEE3

A

Encrypts the plaintext three times

Has an effective key length of 168 bits

17
Q

DES-EDE2

A

Uses three keys but replaces the second encryption operation with a decryption operation.

18
Q

DES-EEE2

A

Uses only two keys.

19
Q

Advanced Encryption Standard

A

Standard only allows the processing of 128-bit blocks.

Rinjdael exceeded the specification.

128, 192, and 256

20
Q

International Data Encryption Algorithm (IDEA) block size?

A

64-bit

21
Q

International Data Encryption Algorithm (IDEA) key size?

A

128-bit key broken in a series of operations into 52 16-bit subkeys.

22
Q

Blowfish block size?

A

64-bit

23
Q

Blowfish key sizes?

A

32 through 448

24
Q

Twofish block size?

A

128-bit

25
Q

Twofish key sizes?

A

128 through 256

26
Q

Diffie-Hellman Key Agreement Protocol

A

Allows two parties to securely agree on a symmetric key via a public channel, such as the Internet, with no prior key exchange.

Uses discrete logarithms to provide security.

27
Q

Elliptic Curve Cryptography (ECC)

A

ECC leverages a one-way function that uses discrete logarithms as applied to elliptic curves.

28
Q

Asymmetric vs. Symmetric

A

Asymmetric is much slower than symmetric encryption, and is also weaker per bit of key length.

29
Q

Hash Functions

A

Provides encryption using an algorithm and no key. They are called “one-way hash functions” because there is no way to reverse encryption.

30
Q

MD5

A

Created by Ronald Rivest

Creates a 128-bit hash value.

MD6 is the newest version.

31
Q

SHA-1

A

160-bit hash value

32
Q

SHA-2

A

SHA-224, SHA-256, SHA-384, and SHA-512

33
Q

HAVAL

A

Hash of Variable Length – is a hash algorithm that creates message digests of 128, 160, 192, 224, or 256 bits in length, using 3, 4, or 5 rounds.

Uses some of the design principles behind the MD family of hash algorithms, and is faster than MD5.