Lecture 3 Flashcards
What is a nonce?
A number that should only be used once.
What is a nonce used for?
A nonce can be combined with the original key used in the One-Time Pad to generate a key the same length as the message, allowing keys to technically be reused, and making them resistant to the Two-Pad attack.
What is PRG? What time does it run in?
PRG is a pseudo-random number generator. It takes a random bitstring, or seed, and expands it into a longer pseudo-random string.
It runs in polynomial time.
What examples of PRG exist?
- Linear Feedback Shift Register (LFSR)
Why is LFSR not suitable?
After a certain amount of ticks, LSFR will repeat. If the coefficient of LSFR is known, an attacker can obtain the original state.
How can LFSR be made more secure?
By combining numerous LSFRs with a non-linear function.
What are the pros of Stream Ciphers?
- Efficient, and can be realised in hardware.
- Buffering data is not necessary, so plaintext length is not needed to be known.
- Not prone to errors (due to low error propagation)
What are the cons of Stream Ciphers?
- Does not offer integrity (attackers can easily and broadly alter plaintext by changing ciphertext)
- Low diffusion (changing one ciphertext character changes one plaintext character)