Podcast
Questions and Answers
What is the purpose of the collision-resistance property in hashing functions?
What is the purpose of the collision-resistance property in hashing functions?
Given a hash output of $k$ bits, approximately how many hashing operations are necessary to find a collision?
Given a hash output of $k$ bits, approximately how many hashing operations are necessary to find a collision?
Which of the following hash functions is considered to be secure for current use?
Which of the following hash functions is considered to be secure for current use?
What is the one-way property of a hash function?
What is the one-way property of a hash function?
Signup and view all the answers
Which of the following statements about SHA-3 is correct?
Which of the following statements about SHA-3 is correct?
Signup and view all the answers
What is the size of the input block for the DES encryption process?
What is the size of the input block for the DES encryption process?
Signup and view all the answers
What is the purpose of the initial permutation in the DES encryption process?
What is the purpose of the initial permutation in the DES encryption process?
Signup and view all the answers
How many rounds of processing does the DES encryption perform on the data?
How many rounds of processing does the DES encryption perform on the data?
Signup and view all the answers
What is the role of the key schedule in the DES process?
What is the role of the key schedule in the DES process?
Signup and view all the answers
What type of operation is performed on the left and right halves of the input during each DES round?
What type of operation is performed on the left and right halves of the input during each DES round?
Signup and view all the answers
What is the final output size of the DES encryption process after the last round?
What is the final output size of the DES encryption process after the last round?
Signup and view all the answers
Which of the following statements is true about the mangler function used in DES?
Which of the following statements is true about the mangler function used in DES?
Signup and view all the answers
The initial key used in DES has how many bits?
The initial key used in DES has how many bits?
Signup and view all the answers
What is the primary characteristic of stateless signatures?
What is the primary characteristic of stateless signatures?
Signup and view all the answers
Which of the following is a known example of hash-based signatures?
Which of the following is a known example of hash-based signatures?
Signup and view all the answers
Which standard deals with modes of operation for an n-bit block cipher?
Which standard deals with modes of operation for an n-bit block cipher?
Signup and view all the answers
What is the useful bit length of the key used in DES?
What is the useful bit length of the key used in DES?
Signup and view all the answers
What does the key schedule in DES produce for each round?
What does the key schedule in DES produce for each round?
Signup and view all the answers
What type of algorithms is described by ISO/IEC 17972?
What type of algorithms is described by ISO/IEC 17972?
Signup and view all the answers
Which of the following is NOT a mode of operation mentioned for block ciphers?
Which of the following is NOT a mode of operation mentioned for block ciphers?
Signup and view all the answers
In the context of DES, which bits are considered parity bits?
In the context of DES, which bits are considered parity bits?
Signup and view all the answers
What is the outcome of the mangler function in the DES decryption process?
What is the outcome of the mangler function in the DES decryption process?
Signup and view all the answers
What happens to the halves Li and Ri during the DES decryption rounds?
What happens to the halves Li and Ri during the DES decryption rounds?
Signup and view all the answers
What is necessary to retrieve Li and Ri from Li+1 and Ri+1 in DES decryption?
What is necessary to retrieve Li and Ri from Li+1 and Ri+1 in DES decryption?
Signup and view all the answers
What is a limitation of DES that TripleDES addresses?
What is a limitation of DES that TripleDES addresses?
Signup and view all the answers
How does the key schedule in TripleDES differ from that in single DES?
How does the key schedule in TripleDES differ from that in single DES?
Signup and view all the answers
In DES decryption, which statement is true regarding the final permutation?
In DES decryption, which statement is true regarding the final permutation?
Signup and view all the answers
What is an essential property of the mangle function during the DES process?
What is an essential property of the mangle function during the DES process?
Signup and view all the answers
Which of the following statements about TripleDES is correct?
Which of the following statements about TripleDES is correct?
Signup and view all the answers
What is the first step in the AES decryption operation?
What is the first step in the AES decryption operation?
Signup and view all the answers
Which operation is performed last in the AES decryption process?
Which operation is performed last in the AES decryption process?
Signup and view all the answers
In the AES decryption process, how many times does the loop execute for n rounds?
In the AES decryption process, how many times does the loop execute for n rounds?
Signup and view all the answers
What is the primary function of the MixColumns operation in AES?
What is the primary function of the MixColumns operation in AES?
Signup and view all the answers
Which property of a hash function ensures that it is infeasible to find an input that maps to a given hash output?
Which property of a hash function ensures that it is infeasible to find an input that maps to a given hash output?
Signup and view all the answers
What does the operation S = SubBytes-1(S) achieve during AES decryption?
What does the operation S = SubBytes-1(S) achieve during AES decryption?
Signup and view all the answers
What is a key feature of the hash function described in the text?
What is a key feature of the hash function described in the text?
Signup and view all the answers
For which purpose is a hash function NOT used according to the content?
For which purpose is a hash function NOT used according to the content?
Signup and view all the answers
What is the main purpose of hashing a password before storing it?
What is the main purpose of hashing a password before storing it?
Signup and view all the answers
What does adding a salt to a hashed password help to prevent?
What does adding a salt to a hashed password help to prevent?
Signup and view all the answers
Which attack method is specifically mentioned as being mitigated by using salts?
Which attack method is specifically mentioned as being mitigated by using salts?
Signup and view all the answers
How does the process of storing a password in encrypted form differ from storing it in hashed form?
How does the process of storing a password in encrypted form differ from storing it in hashed form?
Signup and view all the answers
What is a potential risk if the key used for encrypting passwords is compromised?
What is a potential risk if the key used for encrypting passwords is compromised?
Signup and view all the answers
What security measure can be adopted to slow down brute-force attacks on hashed passwords?
What security measure can be adopted to slow down brute-force attacks on hashed passwords?
Signup and view all the answers
Why is storing passwords in encrypted form considered better than hashed form when securing sensitive data?
Why is storing passwords in encrypted form considered better than hashed form when securing sensitive data?
Signup and view all the answers
What fundamental security issue remains even when passwords are stored using hashing or encryption?
What fundamental security issue remains even when passwords are stored using hashing or encryption?
Signup and view all the answers
Study Notes
Computer Security Lecture 3 - Symmetric Cryptography (II)
- Review of previous lecture topics: block ciphers (e.g., DES and AES), padding, modes of operation (e.g., ECB, CBC, CTR), error propagation, message authentication codes (MACs), MACs based on block ciphers, and authenticated encryption.
- Lecture Structure:
- DES: Data Encryption Standard
- AES: Advanced Encryption Standard
- Hash functions
- MACs based on hash functions
- Hash-based signatures.
DES (Data Encryption Standard)
- Adopted as a standard by the USA's National Institute of Standards and Technology (NIST) in 1976, ratified every 5 years.
- Ultimately replaced by AES (Advanced Encryption Standard) in 2001.
- Uses 56-bit keys (plus 8 for parity checks).
- 64-bit block cipher, encrypting in 64-bit (8-byte) blocks.
- Component Operations:
- Exclusive-or (XOR)
- Permutation
- Lookups
- Left Bitshift
- Loops / Repeated Rounds.
DES Key
- Presented as 8 bytes (e.g., 9F 6D 32 6A 01 68 EC 5B).
- Contains 64 bits, but 8 bits (last bit of each byte) are parity bits.
- Parity bits are effectively ignored and are usually ignored.
- The least significant bit of each byte should be set to ensure an odd number of 1s in each key byte.
- The key effectively contains 56 bits of entropy.
- 56 bits are needed for encryption/decryption.
DES Key Schedule
- 64-bit DES key, ignore the 8-bit parity numbers (8, 16, 24, 32, 40, 48, 56, 64)
- The key schedule algorithm takes the remaining 56-bit DES key as input and generates 16 48-bit subkeys (K1, K2, ..., K16).
- Each subkey is used in one round.
DES Schematic
- Data flow illustrated graphically.
Initial and Final Permutations (IP and IP⁻¹)
- Defined in table format.
- Show reordering of bits in inputs and outputs.
DES Encryption Round
- The process in which the cipher does 16 rounds of operations on input blocks.
- Left half of the output is the right-hand half of the input
- Right half of the output is obtained by XORing the left-hand half of the input with right-half mangled using the round key
DES Decryption
- The steps in reversing the encryption process.
- The mangler function is not needed in decryption.
TripleDES
- DES has been deprecated, but TripleDES is still used.
- TripleDES uses a longer key (112 or 168 bits) for enhanced security than DES (56-bit key).
- Improved resistance against brute-force attacks.
- 112-bit key: k = k1 || k2 (encryption of block b in TripleDES consists of encrypt with k1, decrypt the block b with k2 then encrypt the result with k1).
- 168-bit key: k = k1 || k2 || k3 (encryption of block b in TripleDES consists of encrypt with k1, decrypt the block b with k2 then encrypt the result with k3).
Why not Double DES
- DoubleDES is not secure against brute-force attacks, and can be broken more quickly than DES.
- Meet-in-the-middle attack is possible.
AES (Advanced Encryption Standard)
- Current standard for encryption.
- NIST ran a competition to find a replacement for DES.
- Rijndael (a design by Joan Daemen and Vincent Rijmen) was selected.
- Block size: 128 bits.
- Key sizes: 128, 192, or 256 bits
- Similar principles to DES with a focus on performance optimization in both hardware and software.
AES further materials
- Official definition (NIST publication).
- YouTube conceptual overview (by Gideon Samid).
- Cartoon guide (explaining the principles without diving into the complex math).
AES Schematic
- Diagram shows input and output block data sizes.
AES Key Schedule
- Generates n+1 subkeys from a key.
- The number of rounds is 10, 12, or 14.
AES Operations in the Rounds
- Explanation of the key operations in the rounds.
AES Encryption and Decryption
- Descriptions, and detailed operations for encrypting and decrypting processes.
AES S-Box
- Table listing the mapping of input values to output values in the S-Box.
Hash Functions
- Function that maps variable-length input (
x
) to fixed-length output (y
). - Cryptographic hash functions have three important properties: one-way, second pre-image, collision-resistance.
Standard Hash Functions (SHA, MD)
- Various standard hash functions were and are widely used, including MD4, MD5, SHA-1, SHA-2, and SHA-3 (aka Keccak).
MAC (Message Authentication Code)
- MACs provide data integrity without considering confidentiality.
- Using hash functions to calculate MACs.
- HMAC (Hash-based Message Authentication Code), HMAC function is more widely used MAC than the basic MAC function because HMAC is more security.
Hash-based Signatures
- Discussion of various hash-based signature schemes. (Lamport, Winternitz, Merkle, etc.) and how they're used and their characteristics.
- Descriptions and details of different multi-level signatures (e.g., XMSS, LMS, SPHINCS+) and their characteristics.
Storing Passwords
- Various approaches for securely storing passwords: storing as plaintext, hashing, and encrypting.
- Discussion of the vulnerabilities of each approach.
Lab: AES and Hash Functions
- Lab exercises for demonstration and training.
Appendices
- Further information and explanations of topics.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the core concepts of symmetric cryptography discussed in Lecture 3, including block ciphers like DES and AES, modes of operation, and message authentication codes. You will explore key operations and functionalities of these cryptographic standards, enhancing your understanding of data security mechanisms.