Symmetric Block Encryption Flashcards

1
Q

For DES, what is the size of: the plaintext, the key, the number of rounds?

A

64 bits, 56 bits, 16 rounds (one subkey for each round)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between encryption and decryption for DES?

A

They are the same, except we reverse the subkey order and have the ciphertext as input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is DES not strong?

A

Short key length can be broken with brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does triple DES work? How is it more secure?

A

Perform DES three times, using a different key for each step - note that we encrypt, then decrypt, then encrypt again. By doing this, the key length triples to 168 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can we make triple DES backwards compatible?

A

We use the same key for each step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For AES, what is the size of: the plaintext blocks, the key?

A

128 bit blocks, 128 - 192 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which uses Feistel Structure? AES, DES, 3DES, or all 3?

A

3DES and DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe ECB.

A

Electronic Cook Book. Plaintext is handled one block at a time using the same key. This means the same input block will always produce the same output block. Attackers can mix and match blocks, as there are no integrity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Cipher Block Chaining

A

The input to the algorithm is the XOR of the current plaintext block and the preceding ciphertext block. Same key used for each block. Repeating patterns not exposed. Uses an IV, which is known to sender and receiver. We cannot do preprocessing, or parallelization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Counter Mode

A

Uses a counter, the size of the plaintext block, which is encrypted and then XORed with the plaintext block. It is efficient in hardware and can be parallelized. We can do preprocessing. Uses an IV. We can process blocks at random. Encryption and Decryption are the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can any of the modes detect if blocks have been reordered?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does One Time Pad work?

A

Using a secret bit sequence, the length of the plaintext, we XOR this sequence with the plaintext and send this. The receiver, who knows the sequence too, will XOR this to get the original plaintext.
This is good because there is no relationship between plaintext and ciphertext, encryption and decryption are the same. However, it is bad because how do we communicate the key, the key must be very long, it provides no integrity, and keys cannot be reused (plaintext XOR ciphertext = key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly