Module 4 Flashcards
Do the initial and final permutation in DES provide extra security? Why?
No they don’t.
Just makes DES less efficient to implement in software.
In DES, how does the initial and final permutations differ from from each other?
They are the inverse of each other.
What is the minimum key size for a secure DES key?
128
How does ECB (electronic code book) work?
Step 1: Plain text
Step 2: Split into messages (m1 - mn)
Step 3: Encrypt with secret key (E
What is a drawback of ECB?
Is messagei = messagej, then ci = cj – helps reverse engineering.
How does CBC (cypher block chaining)?
Step 1: Use IV (initialization vector) Step 2: Take message 1 Step 3: XOR message1 and IV Step 4: Encrypt with secret key Step 5: Pass cypher text for next step (XOR)
What are the drawbacks of CBC (cypher block chaining) ?
- Error in a block will propagate
2. Sequential processing (slower!)
Why 3-DES used the Encrypt - Decrypt - Encrypt sequence instead of Encrypt - Encrypt - Encrypt.
- The first and final permutation are needed because the cancel each other out. (Slow brute force)
- Interoperability 3-DES machine can communicate with a 1-DES machine setting k1=k2=k3
How does a stream cypher work?
It uses a pseudorandom sequence generator (PSG) to generate a key stream from a secret key. The PSG is seeded using the secret key.
Step 1. Take PSG
Step 2. Take PT
Step 3. XOR to CT bit stream
What are the advantages and drawbacks of cipher streams?
Advantages:
- High throughput
- Lightweight
- Bit errors are not propagated
Drawback:
- Requires sender receiver synchronization
- Strength relies on your PSG
How would you generate a Linear Feedback Shift Register with 8 bits and tap positions 1,2,3,7
R0 -> R1 -> R2 -> R3 -> R4 -> R5 -> R6 -> R7 ->
Tap between [R1, R2] [R2, R3] [R3, R4]
What are the four steps of RSA?
Step 1. Choose two large prime numbers (typically 512 or higher)
Step 2. Find their product n = pq
Step 3. Choose an integer e that is smaller n and relatively prime to (p-1)(q-1)
Step 4. Find the integer d such that -> ed mod(p-1)(q-1) = 1
What are the drawbacks to private key systems? What is the solution?
- Given Alice and Bob, if Bob is “replaced” a new key key must generated.
- Group communication scenario, there must be n keys for n group members
Solution: digital signature through public keys
What security properties private key cryptosystems do not provide?
- Integrity
- Authentication
- Non-repudiation
- Certification
What is the birthday paradox?
What is the Birthday Paradox: If there are 20 or more people in a room, the probability is greater than 40% that two of them will have the same birthday. That is, square root of 365 is 19.10.