SE4472 FINAL Flashcards
How large is a block in DES?
8 bytes
How large is a block in AES?
16 bytes (128 bits)
What is perfect secrecy?
No way to brute force (one-time pad)
What are the three goals of security?
confidentiality (encryption, public key exchange)
integrity (MACs, hashes)
authenticity (digital signatures, certificates, public key infrastructure)
What are the requirements for an ideal block cipher?
- Encryption should be reversible
- returns original message
- bijection (1:1 mapping)
- permutation (strings map 1:1 w/ itself) - Easy with the key, hard without
- Efficient to compute
What is the difference between a PRP and PRF?
PRF (pseudo random function) does not require 1:1 mapping
What is a feistel network?
Method of turning a PRF into a PRP
- twisted ladder, at least 4 rounds
- decrypt by running backwards
What is the security level of CBC?
If the IV is known: IND-EAV secure
If the IV is random: IND-CPA secure
What is the security level of AES-GCM?
IND-CCA2
What is the security level of ECB?
None (Not IND-EAV secure)
What is the security level of CTR?
If the IV is known: IND-EAV secure
If the IV is random: IND-CPA secure
What is the probability of a successful pre-image resistance attack?
2^(l-1)
** -1 since we already know 1 hash which is the one we are trying to guess with a guess message
What is the probability of a successful second pre-image resistance attack?
2^(l)
**asked essex about this
What is the probability of a successful collision attack?
2^(l/2)
**birthday paradox
How many bits is an MD5 hash?
128
What is computational secrecy?
Not perfect, but only vulnerable to brute force
Public-key exchange achieves which security goal?
confidentialy
MAC codes achieve which security goal?
Ingetrity
Digital signatures achieve which security goal?
Authenticity
What security level does a caesar cipher offer?
None
Deterministic ciphers can offer at most what level of security?
IND-EAV
In a Feistel network, how many rounds is required to turn a strong PRF into a PRP?
4
What block size does DES use?
64 bits
what is security rule #1?
Don’t roll (create) your own crypto