P2L6 Symmetric Encryption Flashcards

1
Q

‘confusion’ block cipher primitive

A

encryption operation where relationship between key and ciphertext obscured, achieved with substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

‘diffusion’ block cipher primitive

A

encryption operation where influence of one plaintext bit is spread over many ciphertext bits with goal of hiding statistical properties of the plaintext, achieved with permutations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are block cipher ‘rounds’

A

cycle in which cipher combines substitution and permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

decryption process for DES

A

use encryption subkeys in reverse order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

each round of DES takes what as input?

A

ciphertext of previous round. The input is divided in left and right halves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

each round of DES outputs what?

A

Output left half is right half of the input. Right half of output is result of XOR-ing left half of input with and output of the mangler function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how long is key in DES?

A

64 bits (but actual value of key is 56 bits because each byte of data contains a ‘parity’ bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is different in each round of DES?

A

the per round key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the input at round one of decryption process? Why?

A

Input is R then L because of swap performed at last stage of encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steps of mangler function in DES

A
  1. Takes right half of input
  2. expands 32 bits of data into 48 bits
  3. XORs this data with the per round key
  4. 48 bit value subtituted into 32 bit value (via s box)
  5. permutation is applied to the result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sbox quiz

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S-box

A

Substitutes 6 bit value into 4 bit value using a predefined table. (there are 8 tables in DES). Outer 2 bits used to index into table rows. Middle 4 bits index into columns of table. Value of table entry is output of the 4 bit value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

security problem with DES

A

key space too small 2^56

sbox design criteria kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Triple DES

A

Running DES 3 times.

Advatage of being able to support multiple key lengths.

k1 != k2 != k3 means you have key length of 168

k1 == k2 && k2 != k3 means key length of 112

k1 == k2 == k3 means key length of 56

Ability to communicate with single DES by using single key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AES key length

A

128, 192, or 256

17
Q

AES data processing blocks

A

128 bits

18
Q

Electronic Code Book (ECB)

A

Simplest way to encrypt large messages. Original mesage broken into fixed size blocks (last block padded) and each lock encrypted using same key.

19
Q

ECB problems

A
  1. can be broken with cryptanalysis because two plaintext blocks can output the same cipher text blocks
  2. message integrity: an attacker can rearrange the blocks or substitute a block. This is because cipertext blocks created independently of one another.
20
Q

Solution to ECB problems

A

cipher block chaining

Output of one cipher linked to the output of a previous cipher block

NOTE: initialization vector must be know to both recipient and sender

21
Q

CBC Residue

A

Last block of CBC chain, sent with plaintext to the receiver.

An attacker who wishes to compromise message integrity will not know key and therefore resend with original CBC residue after altering message. The recipient will compute a different CBC residue, however, and will know that there was loss of integrity.

22
Q

CBC confidentiality AND integrity solution

A

Use two keys. One for encryption, and the other for producing the CBC residue

OR

hash message, append it to the message, and then encrypt the whole entity