P2L6 Symmetric Encryption Flashcards
‘confusion’ block cipher primitive
encryption operation where relationship between key and ciphertext obscured, achieved with substitution
‘diffusion’ block cipher primitive
encryption operation where influence of one plaintext bit is spread over many ciphertext bits with goal of hiding statistical properties of the plaintext, achieved with permutations
what are block cipher ‘rounds’
cycle in which cipher combines substitution and permutation
decryption process for DES
use encryption subkeys in reverse order
each round of DES takes what as input?
ciphertext of previous round. The input is divided in left and right halves.
each round of DES outputs what?
Output left half is right half of the input. Right half of output is result of XOR-ing left half of input with and output of the mangler function
how long is key in DES?
64 bits (but actual value of key is 56 bits because each byte of data contains a ‘parity’ bit)
what is different in each round of DES?
the per round key
What is the input at round one of decryption process? Why?
Input is R then L because of swap performed at last stage of encryption process.
Steps of mangler function in DES
- Takes right half of input
- expands 32 bits of data into 48 bits
- XORs this data with the per round key
- 48 bit value subtituted into 32 bit value (via s box)
- permutation is applied to the result
Sbox quiz
S-box
Substitutes 6 bit value into 4 bit value using a predefined table. (there are 8 tables in DES). Outer 2 bits used to index into table rows. Middle 4 bits index into columns of table. Value of table entry is output of the 4 bit value.
security problem with DES
key space too small 2^56
sbox design criteria kept secret
Triple DES
Running DES 3 times.
Advatage of being able to support multiple key lengths.
k1 != k2 != k3 means you have key length of 168
k1 == k2 && k2 != k3 means key length of 112
k1 == k2 == k3 means key length of 56
Ability to communicate with single DES by using single key