Module 4 Flashcards

1
Q

Do the initial and final permutation in DES provide extra security? Why?

A

No they don’t.

Just makes DES less efficient to implement in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In DES, how does the initial and final permutations differ from from each other?

A

They are the inverse of each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the minimum key size for a secure DES key?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does ECB (electronic code book) work?

A

Step 1: Plain text
Step 2: Split into messages (m1 - mn)
Step 3: Encrypt with secret key (E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a drawback of ECB?

A

Is messagei = messagej, then ci = cj – helps reverse engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does CBC (cypher block chaining)?

A
Step 1: Use IV (initialization vector)
Step 2: Take message 1
Step 3: XOR message1 and IV
Step 4: Encrypt with secret key
Step 5: Pass cypher text for next step (XOR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the drawbacks of CBC (cypher block chaining) ?

A
  1. Error in a block will propagate

2. Sequential processing (slower!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why 3-DES used the Encrypt - Decrypt - Encrypt sequence instead of Encrypt - Encrypt - Encrypt.

A
  1. The first and final permutation are needed because the cancel each other out. (Slow brute force)
  2. Interoperability 3-DES machine can communicate with a 1-DES machine setting k1=k2=k3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a stream cypher work?

A

It uses a pseudorandom sequence generator (PSG) to generate a key stream from a secret key. The PSG is seeded using the secret key.

Step 1. Take PSG
Step 2. Take PT
Step 3. XOR to CT bit stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the advantages and drawbacks of cipher streams?

A

Advantages:

  • High throughput
  • Lightweight
  • Bit errors are not propagated

Drawback:

  • Requires sender receiver synchronization
  • Strength relies on your PSG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would you generate a Linear Feedback Shift Register with 8 bits and tap positions 1,2,3,7

A

R0 -> R1 -> R2 -> R3 -> R4 -> R5 -> R6 -> R7 ->

Tap between [R1, R2] [R2, R3] [R3, R4]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four steps of RSA?

A

Step 1. Choose two large prime numbers (typically 512 or higher)
Step 2. Find their product n = pq
Step 3. Choose an integer e that is smaller n and relatively prime to (p-1)(q-1)
Step 4. Find the integer d such that -> ed mod(p-1)(q-1) = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the drawbacks to private key systems? What is the solution?

A
  • Given Alice and Bob, if Bob is “replaced” a new key key must generated.
  • Group communication scenario, there must be n keys for n group members

Solution: digital signature through public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security properties private key cryptosystems do not provide?

A
  • Integrity
  • Authentication
  • Non-repudiation
  • Certification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the birthday paradox?

A

What is the Birthday Paradox: If there are 20 or more people in a room, the probability is greater than 40% that two of them will have the same birthday. That is, square root of 365 is 19.10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the formula to determine the length of an MD to avoid clashing?

A

2^m/2

17
Q

How many bits do you need at the very least to prevent MD clashing?

A

256

18
Q

What are the four hash algorithms?

A
  • Simple XOR with rotate
  • DES-based message auth code
  • Keyed hash
  • Chain hash
19
Q

What are the benefits of a VPN?

A
  • Cost-effectiveness
  • Flexibility
  • Scalability
20
Q

At its core how does a VPN work?

A

It uses tunnels.

21
Q

What is a VPN tunnel?

A

A logical stream of packets encapsulated in headers.

22
Q

What is one of the distinguishing features of IPSec?

A

The use of key management (IKE).