Lecture 3 Flashcards

1
Q

What is a nonce?

A

A number that should only be used once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a nonce used for?

A

A nonce can be combined with the original key used in the One-Time Pad to generate a key the same length as the message, allowing keys to technically be reused, and making them resistant to the Two-Pad attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PRG? What time does it run in?

A

PRG is a pseudo-random number generator. It takes a random bitstring, or seed, and expands it into a longer pseudo-random string.

It runs in polynomial time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What examples of PRG exist?

A
  1. Linear Feedback Shift Register (LFSR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is LFSR not suitable?

A

After a certain amount of ticks, LSFR will repeat. If the coefficient of LSFR is known, an attacker can obtain the original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can LFSR be made more secure?

A

By combining numerous LSFRs with a non-linear function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the pros of Stream Ciphers?

A
  1. Efficient, and can be realised in hardware.
  2. Buffering data is not necessary, so plaintext length is not needed to be known.
  3. Not prone to errors (due to low error propagation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the cons of Stream Ciphers?

A
  1. Does not offer integrity (attackers can easily and broadly alter plaintext by changing ciphertext)
  2. Low diffusion (changing one ciphertext character changes one plaintext character)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly