Lecture 4 Flashcards

1
Q

What makes AES better than 3DES?

A

3DES is slower because you have to go through it 3 times and each time has 16 rounds. AES for 128 bit keys for example has 10 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For each round of AES, what consists of the round function?

A

It consists of randomness from bytesub (s-box on each byte), shiftRows(cyclic shift of each row), mixcolumns (linear transformation of each column)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is AES faster?

A

It operates on bytes instead of bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES vs DES

A

AES uses a substitution-permutation network and DES uses Feistel Network. DES is bit oriented, AES is byte oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the point of modes of operation in block ciphers?

A

Because block ciphers only encrypt fixed-size blocks, you need modes of operation to encrypt more than one block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECB Mode

A

Each block is encoded by the same key, independent of each other. Con: if two blocks are the same, they get the same encryption because we are using the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recall: What is semantic security for one time key?

A

With one time key, adversary only sees one ciphertext, so if Eve can’t tell anything about which message was encrypted it is semantically secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is ECB semantically secure?

A

Not if ECB is being used to encrypt more than one block (because they’d encrypt the same..so it leaks info to Eve that at least two blocks have the same plaintext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CTR mode

A

more secure: building a stream cipher out of the block cipher
XOR plaintext message with pseudorandom pad generated by AES or DES (fragments of message XOR f(k,0) or XOR f(k,1))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is CTR mode semantically secure?

A

If the function used to generate pseudorandom pad is prf then yes (semantically secure means Eve can’t tell the difference between something encrypted using OTP and something encrypted using deterministic ctr mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is semantic security for many time key?

A

Eve can’t do CPA attack (Eve sees multiple ciphertexts encrypted by same key but can’t decipher plaintext even after encrypting arbitrary messages of her choice)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two ways to ensure that encryption using a many-time key doesn’t result in the same encryption for two of the same messages?

A

Solution 1: Randomized Encryption: encrypting the same message twice gives you different ciphertexts (ciphertext must be longer than plaintext so that you can include randomized bits)

Solution 2: Nonce-Based Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How secure is randomized encryption?

A

The encryption algorithm is semantically secure under CPA if every time you encrypt a message, its encrypted using a new uniform random OTP and the OTP is generated by secure PRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nonce based encryption

A

(k,n) pair never used more than once (noteL both nonce based and randomized encryption are examples of ways to generate IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CBC Mode

A

This is the best mode to use if you want to use same key more than once. Each previous cipher is chained with current plaintext block. Process starts with random IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is CBC semantically secure under CPA attack?

A

Yes if the encryption algorithm is a secure PRP. Also IV MUST be random