Midterm Flashcards

1
Q

ECB pros/cons

A

o Simple
o Don’t have to create/manage an IV
o Parallel encryption/decryption
o Reveals patterns in the plaintext – should not use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CBC pros/cons

A

o Conceals plaintext patterns
o Requires sequential encryption
o Parallel decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CTR pros/cons

A

o No need for padding
o Only have to implement encrypt function
o Parallel encryption/decryption
o Preprocessing able to generate the keystream in advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CFB pros/cons

A

o No need for padding
o Only have to implement encrypt function
o Parallel decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OFB pros/cons

A

o No need for padding
o Only have to implement encrypt function
o Preprocessing able to generate the keystream in advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why encryption padding?

A

So that all blocks are “full”
Disguise identical messages
Disguise message length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Properties of cryptographic hash functions

A
Can be applied to a block of data of any size
Fixed-length output
Relatively easy to compute
One-way
Weak collision resistance
Strong collision resistance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collision attack

A

Two messages both hash to the same value

2^(n/2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pre-image attack

A

Given a message m1, find a different message m2 such that hashes to the same value.
2^n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Three ways to implement MACs

A

CBC-MAC (encrypt with CBC and use the last block as the MAC)
Hash the message and encrypt the digest
Hash the message with the shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why DH and RSA are secure

A

the discrete logarithm is a difficult problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Five steps a relying party uses to verify a certificate

A

o Integrity
o Expiration
o Revocation
o Usage constraints
• Basic Constraints
o Can the subject act as a CA?
o Is there a limit to the length of the certificate
chain?
o Limitation on key use – encryption or signing
o Ownership
• Does the entity presenting the certificate have access
to the associated
private key?
• Challenge for ownership of the key at the time of the
transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly