Symmetric Key Algorithms Flashcards
Ch 6 of (ISC)2 CISSP Official Study Guide
What function does this stand for ^?
The AND operation where both inputs have to be true for a true output value. Only an X and Y of 1 produce and output value of 1.
What function does this symbol stand for? v
The OR operation. Only one value needs to be TRUE in order to produce a TRUE value.
e.g. 1 +0 = 1 but 0 = 0 = 0
What function does this symbol represent? ~
The NOT operation. The NOT operation is the opposite of the function so a 1 with the NOT operation applied is 0 and vice versa.
What function does this symbol represent? ⊕
The exclusive OR operation. If one value OR the other is TRUE then the result is TRUE. 1 + 1= 0 but 1 +0=1
What is a NONCE?
A random number that acts as a placeholder variable in mathematical functions.
Give an example of a NONCE.
An IV or initialization vector which is a random bit string that is the same length as the block size and is XORed with the message. They are used to create unique ciphertext everytime the the same message is encrypted using the SAME KEY.
What is SPLIT KNOWLEDGE?
When information or privelige is split among different users so no one perosn has the ability to compromise the security of an environment.
What is a TRANSPOSITION CIPHER?
Rearrangement of letters
What is a SUBSTITUTION CIPHER?
Uses an encryption algorithm to replace the letters of a message
What other name is a ONE TIME PAD known as?
Vernam Cipher
What are the requirements or rules for keeping a ONE TIME PAD secure?
- Must be randomly generated.
- Must be physically protected against disclosure
- Can be used only ONCE
- Key must be at least as long as the message
What other name is a RUNNING KEY CIPHER known as?
A BOOK CIPHER
A Transpostion CI{HER is also known as a ________________ Cipher.
BLOCK
A STREAM CIPHER works on a _____ at a time
BIT
What causes CONFUSION in Cryptography?
When the relationship between the plaintext and the key is so complicated that moving the text around is not enough to decipher it
What causes DIFFUSION in Cryptography?
When a change in the plain text causes multiple changes in throughout the ciphertext.
What are some of the issues with SYMMETRIC KEY Cryptography?
- Key Distribution is problematic- must have a secure method to EXCHANGE keys
- Does not provide non-repudiation
- Not SCALABLE
- Keys have to be regenerated often- if a person leaves every key know (exchnaged) must be regenerated
How is SYMMETRIC KEY ENCRYPTION accomplished? (How many keys)
Each participant has ONE secret key that must be known to both parties. Two keys used.
How is ASYMMETRIC KEY encryption accomplished?
Using a PUBLIC Key (known to all) and a PRIVATE KEY (Known only to one side).
Person encrypting uses the recipient’s PUBLIC KEY which is decrypted by the PRIVATE KEY of the recipinent.
What is the formula to determine the number of SYMMETRIC KEYS required?
Number of Keys= n(n-1)/2
What are the advantages of ASYMMETRIC KEY encryption?
- Addition of new users requies generation of only one public-private key pair
- Key revocation of one key is easy to accomplish
- Provides Repudiation, Authentication and nonrepudiation
- Key distribution simple- public key can be made available to anyone and public key cannot derive the private key
- No pre-existing communications need to exist (such as sharing a secret key as in symmetric key cryptography).
Name the modes of DES Symmetric encrption algorithm
- Cipher Block Mode (CBC)
- Cipher Feedback Mode (CFM)
- Output Feedback Mode (OFM)
- Counter Mode (CTR)
1. How does ECB work
2. Name security flaw(s),
3. What algorith is it part of,?
4. What does ECB stand for?
- Encrypts 64 bit blocks withthe same secret key
- Subject to eavesdropping
- DES
- Electronic Codebook
1. How does CBC work
2. Name security flaw(s),
3. What algorith is it part of,?
4. What does CBC stand for?
- Each block of unencrypted text is XORed with the block of ciphertext immediatley preceding it before its encrypted with DES. CBC also implments a IV amd XORs the first block of the message prodcuing aunique output. IV must be sent to recipient in plaintext,
- If one block is corrupted errors propogate makign decryption impossible
- DES
- Cipher Block Chaining Mode
1. How does CFB work
2. Name security flaw(s),
3. What algorith is it part of,?
4. What does CFB stand for?
- Streaming version of CBC. XORs and uses IV. Uses memory buffers the same block size instead of breaking the message into blocks. As buffer becomes full it gets encrypted. Uses real time data (done in the buffer) and uses IV and chaining.
- Assume that errors propogate?
- DES
- Cipher Feedback Mode
1. How does OFB work?
2. Name security flaw(s) or advantages,
3. What algorith is it part of,?
4. What does OFB stand for?
- XORs plaintext with a seed value. For first block IV is used to create seed value and then running DES. Future seed values are derived by running DES on previous seed values.
- No chaining function- errors do not propogate to affect decryption
- DES
- Output Feedback Mode
1. How does CBTRwork
2. Name security flaw(s),
3. What algorith is it part of,?
4. What does CTR stand for?
- Stream cipher similiar to CFB. Similar to CFB but does not use a seed value, uses a counter that increments for each operation.
- Uses chaining so may propogate errors?
- DES
- Counter Mode
Name the versions of TRIPLE DES (3 DES), the number of encryption/decryption operations and keys and the key lengths of each.
- DES-EEE3, 3 encryption operations, 3 Keys, 168 BIT KEYS
- DES-EDE3, 2 encryption operations with decryption in the middle, 3 keys, 168 BIT KEYS
- DES-EEE2, 3 Encryption operations, and 2 Keys, 112 BIT KEYS
- DES-EDE2, Two encryption operations with a decryption operation in the middle, 112 BIT KEYS
- What is IDEA?,
- How does it work?
- What modes is it capable of operating in?
- What secure e-mail package is based off of IDEA?
- International Data Encryption Algorithm
- Operates on 64 bit block of text, begins with a 128 bit key, broken into 52 16 bit subkeys which act on input text with XOR and Modulus operations to produce encrypted/decrypted versions of the input message
- Same modes as DES: ECB, CBC, CFB, OFB,, CTR
- PGP- Pretty Good Privacy
1. What is BLOWFISH
2. How does it work?
3. How many bits does it use?
4. What are its advantages?
- A symmetric cryptographic alogrithm
- Works on 64 bit blocks of text
- Allows variable key lengths from 32 to 448 bits
- Faster thaIDEA and DES
- What is Skipjack?
- How does it work?
- What does it support that is unique?
- A symmetric encryption algorithm
- Works on 64 bit-blocks of text. Uses an 80 bit key and supports the four modes of operation of DES (CBC, OFB, ECB, CTR)
- Supports escrow of encryption keys- NIST and Dept. of Treasury have the keys
- What is RC5?
- How does i work?
- What are the security implications of the algorithm?
- Rivest Cipher 5, a symmetric algorithm
- It is a variable block cipher 32, 64, or 128 bits and uses key sizes 0-2,040 bits
- 64 bit key took 4 years to crack a single message