CprE 331 Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

what is avalanche effect?

"If we change a single bit of the plaintext, then (statistically) half of the bits in the ciphertext should change."

The security of DES depends heavily on ....

"S-boxes" each maps 6 bits to 4 bits

Intense analysis on the security of DES revealed there was no

"back door"

ECB Mode: for a fixed key k, this is a ____ version of a codebook cipher (w/o additive)

"electronic" **a different key means a different codebook

what is diffusion

-spread plaintext statistics through the ciphertext

AES block size: ___, Key length: _____, _______ rounds

128, (128,192 or 256 independent of block size), 10 to 14 (depends on key length

digram

2 letter combination most common is th

trigram

3 letter combination most common is the

DES is a Feistel cipher w/ __ bit block length, __ bit key length, __ rounds, and __ bits of key used each round(subkey)

64, 56, 16, 48

What is usually the value of RSA e

65537

RC4

A self-modifying lookup table of 256 elements, Table always contains a permutation of the byte values 0,1,...,255, Initialize the permutation using key

Which is more current DES or AES?

AES

Codebook Cipher: Additive

Additive - book of "random" numbers, Encrypt message with codebook, Then choose position in additive book, Add additives to get ciphertext, Send ciphertext and additive position, Recipient subtracts additives before decrypting

Examples of classic Stream Ciphers

Autokey Vigenere cipher and Vernam Cipher

3 modes that can be used as stream cipher

CFB, OFB, CTR

Which mode is a way to use a block cipher like a stream cipher?

CTR

you have a simple sub but don't know what cipher to use what is the first thing to do?

Calculate letter frequency

Why is One-Time pad probably secure?

Ciphertext provides no info about plaintext, All plaintexts are equally likely, Perfect secrecy

What did Claude Shannon come up with?

Confusion, diffusion, and avalanche effect

AES was the replacement for....

DES

Fiestel Structure is used for _____ and other implementations such as _____

DES, Triple Data Encryption Algorithm and Camellia block cipher

Availability

Data is available in a timely manner when needed

Integrity

Detect unauthorized writing of information

Baconian Cipher

Each letter is replaced by a sequence of 5 characters

What was the The Bombe and what did it run?

Electro-mechanical device ran all possible enigma rotor configurations

What are the 6 modes of operation for block ciphers?

Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB)

True or false ChaCha20 is NOT a variant of Salsa20

False

How to encrypt plaintext using playfair cipher

Have a key word and make a 5x5 matrix, plaintext is encrypted 2 letters at a time, repeating letters in same pairs separated with x (filler letter), 2 plaintext letters that fall in the same row in the matric are replaced by the letter to the right, 1st element of row circularly following the last, 2 plaintext letters that fall in the same column are each replaced by the letter below, Top element of the column circularly following the last, Otherwise, each plaintext letter is replaced by the letter that lies in its own row and the column occupied by the other plaintext hs becomes BP

DES was based on _____ cipher and was a ____ government standard

IBM's Lucifer, U.S.

What is different about the IV used for CFB?

IV is greater than 8 bits, but then only 8 bits (s value) used from the output of encryption, This is XORed with the 8 bits of Plaintext

Exhaustive Key Search

If there are X keys, you have to try X/2 (or ½) of them before you find the correct key

Salsa20

Internal state is 16 - 32 bit words in a 4x4 matrix, Constant is "expand 32-byte k"

what happens when Low impact CIA loss occurs?

Limited adverse effect, Service slightly less, Minor damage to assets/people, Slight financial loss, Minor harm to people

Codebook Cipher

Literally, a book filled with "codewords"

Problem with classic stream ciphers

Logistical problem of getting the keystream (key word or paper tape) to both parties

CTR & ___ can be done in parallel whereas CBC and ___ must be done serially

OFB, CFB

Salsa20 uses 2 rounds per loop (double round) what is used in the odd rounds and what happens during the even rounds?

Odd rounds use the columns values in the 4x4 matrix, Even rounds use the row values

Transposition Ciphers

Permutations of the original characters only, No shifts, No substitutions, Letters stay the same, Just reorder the letters

Rail Fence

Plaintext is written down as a sequence of columns, Transmitted as a sequence of rows

Confidentiality

Prevent unauthorized reading of information

Real- World One- Time Pad

Project VENONA, Spy carried one-time pad into U.S., Spy used pad to encrypt secret messages, Repeats within the "one-time" pads made cryptanalysis possible

Newer Stream Ciphers

Salsa20 (20 rounds) Cha Cha (also 20, 12, 8 rounds)

what happens when Moderate impact CIA loss occurs?

Serious adverse effect, Service degradation, Damage to assets/people, Some financial loss Moderate, Harm to people, but not loss of life

what happens when high impact CIA loss occurs?

Severe or catastrophic adverse effect, Service loss, Major damage to assets/people, Financial loss, Loss of life

Caesar's Cipher

Shift by 3

AES: what are the 4 functions used in a round

SubByte (nonlinear layer), ShiftRow (linear mixing layer), MixColumn (nonlinear layer), AddRoundKey (key addition layer)

Atbash Cipher

Substitution cipher with a single key, All the letters of the alphabet are reversed

What does RC4 do at each step?

Swaps elements in current lookup table, Selects a keystream byte from table

Cryptology

The art and science of making and breaking "secret codes"

Kerckhoffs' Principle

The crypto system is completely known to the attacker

How to avoid patterns with the Vignere Cipher

The ultimate defense against such a cryptanalysis is to choose a keyword that is as long as the plaintext and has no statistical relationship to it

True or false key has to be distributed each time

True

cryptographic systems are characterized along 3 independent dimensions which are?

Type of operation that transforms plaintext to ciphertext, number of keys used, Way the plaintext is processed

When was the Golden Age of Cryptanalysis

WWII

The 2 letters commonly used for a Baconian cipher

a's and b's

Examples of availability

authentication services (Okta), dns not working for several hours, cutting main fiber coming into campus

Other things that could be added to CIA triangle

authenticity and accountability

Each step of A5/1 produces only a _____ which is efficient is _____

bit, hardware

CBC Mode

blocks are "chained together" random initialization vector (IV) is needed

Cryptanalysis

breaking "secret codes"

Each step of RC4 produces a ____ which is efficient in ____

byte, software

Polyalphabetic Substitution

code words, changing the shift for every letter of the code word, so multiple shift by n ciphers

what are the 3 components of the CIA triangle?

confidentiality, integrity, availability

What is Galois Counter Mode?

counter mode so IV, IV +!, IV +2, etc for encryption. Uses Galois field multiplication -- finite field of elements (integers mod p where p = prime number) authenticated encryption

What is different about the ChaCha20 matrix?

different order same constant and internal state still 16-32 bit words in 4x4 matrix

Most common letter followed by the next few common letters

e (most common), t, a

3 ways asymmetric key crypto benefits us

encryption/decryption, digital signature, key exchange

The modes of operation for block ciphers are available for what?

for confidentially on storage devices

Examples of confidentiality

grade info, personnel records, AWS buckets

For a Feistel Cipher encryption you split the plaintext back into?

halves

3 levels of impace for CIA Loss(es)

high, moderate, low

what does it mean when a block cipher mode can be used as a stream cipher?

it means it can operate in real time. Each character can be encrypted and transmitted immediately (8 bits) instead of waiting for block of X bits (128 bits)

What are the Two Difficult Problems with Symmetric Encryption

key distribution and digital signature

Cryptography

making "secret codes"

What is the downfall of CBC Mode?

malleability -- if you can determine the block you need to manipulate and you can change the block before it you can get the outcome you want

Salsa20 is an example of

nothing up my sleeve

What is confusion

obscure relationship between plaintext and ciphertext

What is different about OFB when compared to CFB?

operates in full blocks of plaintext

What is similar between OFB and CFB

output fed to become input

AES: what is used as the input block

plaintext (end w/ final state output block)

Dad confidentiality does not equal

privacy

Which elements of the CIA triangle are protected in Galois Counter Mode

protect confidentiality AND integrity

Deterministic scheme

same plaintext # gets encrypted into same ciphertext #

CBC Mode: what does the same plaintext yield and is it bad?

same plaintext yields different ciphertext and this is not bad

ECB Mode: what does the same plaintext yield and is it bad?

same plaintext yields same ciphertext yes this is bad

Asymmetric Key Cryptography has 2 related keys what are they and what is this based on?

sender uses recipient's public key to encrypt, Recipient uses private key to decrypt. Based on "trap door one way function"

Shift by n substitution

shift by n for some n in {0,1,2,..25} key is n

What is simple substitution?

shifting letters in the alphabet or by some other form of patterns

Monoalphabetic Cipher

simple sub key can be any permutation of letters

Playfair Cipher is a ___ cipher

substitution

what does availability assure?

systems work properly and service is not denied to users

Why are monoalphabetic ciphers easy to break

they reflect the frequency data of the original alphabet

The idea of Differential Cryptanalysis is

to compare input and output differences

True or false pad (key) is the same size as message

true

Enigma

typewriter, light board, plugboard, 3 rotors (26^3) w/ key length of 17,576, later 4 & 5 rotors key lengths of 456,976 and 11,881,373

What is similar between CFB and CBC?

units of plaintext are chained together and IV is required

Vignere Cipher

use code word as key (repeated for length of message), add code word letter and plaintext letter together

A5/1: Shift Registers

uses 3 shift registers X: 19 bits, Y:22 bits, and Z: 23 bits, 64 bits of key you put into these registers

What does OFB use instead of IV?

uses a nonce

Example of codebook cipher

zimmerman telegram


Conjuntos de estudio relacionados

Comp sci Practice Attempt - 2020 Practice Exam 1 MCQ

View Set

Comprehensive Core Competency CNA

View Set

Macroeconomics ch 30, 34, 36, and 40

View Set

AP Psychology Unit 7 Test; Cognition

View Set

Micro 270- Ch 1 and Ch 2 Concepts

View Set

the child with a cardiovascular disorder (nclex questions)

View Set

a&p exam Most hormones are made of chains of amino acids and are therefore

View Set