Lecture 4 Flashcards
What are the pros of block ciphers?
- Greater diffusion than stream ciphers.
- Uses blocks (so plaintext length does not need to match the key)
What are the cons of block ciphers?
- Less efficient than stream ciphers.
- There is a higher error propagation effect.
What network does 3DES use?
Feistal Network
Why is 3DES used and not 2DES?
2DES is vulnerable to meet-in-the-middle attacks. This means that 2DES has 2^n+1 steps compared to the desired 2^2n if the algorithm scaled correctly.
Meet in the middle: could potentially decrypt a piece of ciphertext with one key and encrypt the plaintext with another key, and then search for a match. This significantly reduces the effort needed to break the encryption. 3DES, with its three layers of encryption, is not susceptible to this type of attack in the same way.
What is the Feistal Network?
A function that remains invertible even if using non-invertible functions. This ensures confusion and diffusion which are necessary for sound encryption.