rand Flashcards
save
computationally secure
An encryption scheme is computationally secure if the ciphertext generated by the scheme meets one or both of the following criteria: • The cost of breaking the cipher exceeds the value of the encrypted information. • The time required to break the cipher exceeds the useful lifetime of the information.
The RSA Public Key Encryption algorithm is satisfactory if, given e and n, d can be easily determined.
False
For Symmetric encryption to work, the keys must be hosted in a public place.
False
The RC4 algorithm is a symmetric block cipher.
False
RC4 is a stream cipher.
It is a variable-key-size stream cipher with byte-oriented operations. The algorithm is based on the use of a random permutation
Timing attacks are a byproduct of how RSA functions and therefore only impact RSA.
False.
a snooper can determine a private key by keeping track of how long a
computer takes to decipher messages [KOCH96]. Timing attacks are applicable
not just to RSA, but also to other public-key cryptography systems. This attack is
alarming for two reasons: It comes from a completely unexpected direction and it
is a ciphertext-only attack.
Four approaches to attacking RSA algorithm
Four possible approaches to attacking the RSA algorithm are as follows:
• Brute force: This involves trying all possible private keys.
• Mathematical attacks: There are several approaches, all equivalent in effort to
factoring the product of two primes.
• Timing attacks: These depend on the running time of the decryption algorithm.
• Chosen ciphertext attacks: This type of attack exploits properties of the RSA
algorithm. A discussion of this attack is beyond the scope of this book.
In order for 4 people to communicate securely using public key cryptography, only 4 pairs of keys need to be generated.
True
n key pairs
In cryptanalysis, the ciphertext-only attack is the easiest to defend against.
True
The ciphertext-only attack is the easiest to defend against because the opponent
has the least amount of information
Elliptic curve cryptography (ECC) is promising because it provides equal security compared with RSA with a larger bit size.
False
The principal attraction of ECC compared to RSA is that it appears to offer
equal security for a far smaller bit size, thereby reducing processing overhead. On
the other hand, although the theory of ECC has been around for some time, it is
only recently that products have begun to appear and that there has been sustained
cryptanalytic interest in probing for weaknesses. Thus, the confidence level in ECC
is not yet as high as that in RSA.
If both the sender and receiver have the same key, the system is referred to as
Symmetric encryption, single-key encryption, secrety key encryption.
NOT public key encryption
Each party wishing to communicate with RSA Encryption must have:
A pair of one Private Key and a Public Key
Stages in Advanced Encryption Standard (AES)
Add round, shift rows, substitute bytes, mix columns
mix rows is not a stage in AES.
Which of the following is considered a public-key cryptography algorithm?
Diffie-Hellman.
Not
DES (Data Encryption Standard)
RC4
AES (Advanced Encryption Standard)
Which of the following is/are true about block cipher modes of operation?
With the Electronic Code Book mode (ECB), if the same b-bit block of plaintext appears more than once in the message, it always produces the same ciphertext.
A plain text of length nb is divided into n b-bit blocks (P1, P2,c,Pn).
Each block is encrypted using the same algorithm and the same encryption key, to
produce a sequence of n b-bit blocks of ciphertext (C1, C2,c,Cn).
For lengthy messages, the ECB mode may not be secure. A cryptanalyst may
be able to exploit regularities in the plaintext to ease the task of decryption
Applications for Public-Key Cryptosystems
If there are 4 individuals, under symmetric key distribution (where individuals share the same keys), how many total keys are needed for all individuals to securely communicate with one another?
6 keys
Each time a new user is added to the system, it needs to share anew key with each previous user. Thus, fornusers, we have1 + 2 +. . .+ (n−1) =n(n−1)/2 keys.
In general, cryptographic systems are classified along which dimensions?
I. The type of operations used to transform plaintext to ciphertext
II. The number of keys used
III. The way in which the plaintext is processed