Symmetric Cryptography 2 - CTR, OFB, CBC, etc ... Flashcards

1
Q

if numbers are same result is “0”, if numbers are different result is “1”.

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

symmetric algorithm, feistel function, splits block on plaintext in 2 parts (L0/R0), round function is applied to one half and round function is performed on one half, output is then XOR’d w/other half, for 16 rounds.

A

DES (symmetric algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

symmetric algorithm, different from DES because AES uses 4x4 matrix of bytes, called state, also called substitution permutation matrix.

A

AES (symmetric algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

symmetric algorithm, has 4 modes -> ECB : 64-bit block entered into and block cipher text is produced, if last full padding is added, used for small amounts of data, creates patterns, considered weak.

A

DES (symmetric algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used for large amounts of data, uses 64 bit blocks of data, but inserts bits from previous cipher text block, uses XORing, IV.

A

CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

emulates a stream cipher turns block cipher into stream cipher, bits to encrypt the next block come from ciphertext of proceeding block using XORed w/plaintext to produce current ciphertext block, encrypts individual characters, uses chaining as in CBC.

A

CFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

turns block cipher into stream cipher, XORed w/plaintext blocks to generate ciphertext, great for digital data and signal transmission, errors do not propagate, IV is used to create seed value for next encrypted block.

A

OFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

turns block cipher into stream cipher, generates next keystream block by encrypting successive values of a counter that do not repeat for long, IV increments in value for every packet in message instead of whole message.

A

CTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symmetric algorithm, key whitening, XOR a key w/text before round function after or both, uses 48 rounds.

A

DESx (symmetric algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly