• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

Outline a method that might be used to attack Monoalphabetic Substitution

Brute force but very difficult since the number of possible keys is 26! = 4*10^26

What is transposition cipher?

A method of encryption by which the positions held by units of plaintext are shifted according to a system, so that the ciphertext constitutes a permutation of the text

Give an example of a transposition cipher

Plaintext: "attack at midnight"


Rail fence technique:


A t c a m d i h


t a k t i n g t


Ciphertext: Atcamdihtaktingt

Modern encryption methods involve transformations using eXclusive OR. What is the main benefit of this?

Speed is the main benefit of using XOR

Describe the operation of a single round of a Feistel Cipher

1) Partitions block into two halves, L0 and R0


2) Processes through n rounds


3) Divide key into n subkeys, one per round


4) At each round i:


4.1) Perform substitution on current left half Li-1 by XORing it with F(Ki, Ri-1)


4.2) F is known as the round function


4.3) Swap halves

Give 3 examples of Feistel Ciphers

1) DES


2) Triple DES


3) IDEA

List the 5 elements that define a Feistel Cipher

1) Block size


2) Key size


3) Subkey generation algorithm


4) Number of rounds


5) The round function, F


The AES was selected in 2001 from several algorithms that met the minimum requirements laid down. List 5 of the criteria that were used to select from these qualified algorithms?

1) Speed


2) Small memory requirement


3) Security


4) Simplicity


5) Suitability for both hardware and software

Give an overview of the operation of the DES algorithm

1) A Data Encryption Standard made in 1976


2) Block size is 64 bits


3) Key size is 56 bits


4) There are 16 number of rounds


5) Feistel cipher with additional Initial and Final Permutations

Give an overview of the operation of the AES algorithm

1) Advanced Encryption Standard made in 2001


2) Chosen by design competition


3) Requirements are


3.1) Algorithm in public domain


3.2) Royalty-free


3.3) Block size is 128 bits


3.4) Key sizes are 128, 192, 256 bits

Explain what is Triple DES

Similar to DES but key length is 168 bits unlike DES which has 56 bits

How does Triple DES differ from DES? Use a diagram

Uses three keys and three executions of DES.

Compare the 3DES encryption algorithm to the AES encryption algorithm

AES is a much faster encryption algorithm than 3DES and also 3DES runs into problems when encrypting 32 gb of data or more with a single key whereas AES has the limit much higher

Explain precisely how a stream cipher such as RC4 can be broken by a known plaintext attack if the same stream key is used more than once

If plaintext-ciphertext pairs can be gathered, then it is easy to record the keystream



For example:


Say we have a known plaintext-ciphertext pair (Ci, Pi)


We can easily find the stream key used by


Ci = Pi + Ki


Pi (+) Ci = Pi (+) Pi (+) Ki


Pi (+) = Ki



Thus the cipher is broken if there's any way to predict key stream for the next cipher

What are the drawbacks of using a block cipher in Electronic Codebook (ECB) mode?

Identical plaintext blocks are encrypted into identical ciphertext blocks therefore it does not hide data patterns aswell

How does Cipher Block Chaining (CBC) work? Use a diagram

Each plaintext block is XORed with the previous ciphertext block before being encrypted

Explain how a Counter mode (CTR) cipher works.

Each plaintext block is XORed with an encrypted counter

What are the advantages of Counter Mode (CTR) cipher over chaining modes such as Cipher Block Chaining?

1) Calculations can be done in parallel



2) Can do pre-processing



3) Allows random access

Explain how Cipher Feedback (CFB) mode allows a block cipher that can be used as a stream cipher

Ciphertext resulting from previous encryption is used in encryption and s bits of the result are XORed with s bits of plaintext

How does link encryption differ from end-to-end encryption?

Link encryption has each pair of connected nodes sharing a key while an end-to-end encryption has only the source and destination assigned have the key

Give one scenario where you might recommend link encryption over end-to-end encryption

WPA uses

Give one scenario where you might recommend end-to-end encryption over link encryption

TLS/SSL uses