Cryptography Basics Quiz - Week 3

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the Initialization Vector (IV) do in CBC mode?

  • It ensures proper encryption without previous output. (correct)
  • It increases the key size for stronger encryption.
  • It encrypts the plaintext directly.
  • It reduces the number of encryption rounds.

The final round of AES encryption includes the MixColumns step.

False (B)

What are the key sizes used in the Advanced Encryption Standard (AES)?

128, 192, or 256

Public key encryption involves a _____ key, which is kept secret, and a _____ key, which is shared.

<p>private, public</p> Signup and view all the answers

Match the encryption methods with their descriptions:

<p>Initialization Vector (IV) = Ensures proper encryption without previous output Public Key Encryption = Solves key distribution problems using a key pair Digital Signatures = Provides integrity and authentication for messages AES = Uses substitution and permutation for encryption</p> Signup and view all the answers

Which step in AES involves permutations to mix the columns of data?

<p>MixColumns (A)</p> Signup and view all the answers

Digital signatures use a public key to sign a message and a private key to verify it.

<p>False (B)</p> Signup and view all the answers

What problem does public key cryptography address?

<p>Key distribution problem</p> Signup and view all the answers

What does the Caesar Cipher do to each letter in the alphabet?

<p>It shifts each letter forward by three letters. (A)</p> Signup and view all the answers

The Vigenère Cipher uses only one letter to create the ciphertext.

<p>False (B)</p> Signup and view all the answers

What is the purpose of Padding in cryptography?

<p>To adjust the length of the message to fit the block size required for encryption.</p> Signup and view all the answers

In encryption, the process of obscuring the relationship between the key and the ciphertext is known as _______.

<p>confusion</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>S-boxes = Substitute data blocks using a lookup table P-boxes = Permute bits to change their order Key schedules = Generate multiple round keys from an initial key Modes of Operation = Define how block ciphers process data</p> Signup and view all the answers

Which mode of operation links blocks using an XOR operation on the output of the previous block?

<p>Cipher Block Chaining (CBC) (C)</p> Signup and view all the answers

In the Electronic Codebook (ECB) mode, each block of plaintext is encrypted independently.

<p>True (A)</p> Signup and view all the answers

What is the primary function of stream ciphers?

<p>To perform encryption and decryption on a continuous stream of data.</p> Signup and view all the answers

Flashcards

Caesar Cipher

A simple substitution cipher where each letter is shifted a fixed number of positions down the alphabet.

Vigenère Cipher

A method of encrypting alphabetic text using a keyword to create different substitution rules for each letter.

Stream Ciphers

Encrypting and decrypting data one bit or byte at a time using a key.

Padding

Adding extra bytes to the end of a message to meet a specific block size requirement during encryption.

Signup and view all the flashcards

S-boxes

Lookup tables that replace blocks of data with other values, introducing confusion in encryption.

Signup and view all the flashcards

P-boxes

Rearrange bits without altering their values, introducing diffusion in encryption.

Signup and view all the flashcards

Key schedules

Processes that generate multiple subkeys from a single initial key, adding complexity to encryption.

Signup and view all the flashcards

Modes of Operation

Different ways block ciphers process data blocks, impacting security.

Signup and view all the flashcards

ECB (Electronic Codebook)

A mode of operation where each block is encrypted individually, potentially exposing patterns.

Signup and view all the flashcards

CBC (Cipher Block Chaining)

A mode of operation where each block is linked to the previous one using XOR, improving security.

Signup and view all the flashcards

Initialization Vector (IV)

A pseudo-random value used in CBC encryption to ensure each block is encrypted independently, preventing patterns in the ciphertext. It enhances confusion between plaintext and ciphertext.

Signup and view all the flashcards

Advanced Encryption Standard (AES)

A modern symmetric encryption standard using substitutions and permutations (a substitution permutation network) to transform data into ciphertext.

Signup and view all the flashcards

Symmetric Encryption

An encryption method that uses the same secret key for both encryption and decryption.

Signup and view all the flashcards

Key Distribution Problem

The challenge of securely sharing secret keys between communicating parties over an insecure channel.

Signup and view all the flashcards

Public Key Cryptography

Asymmetric encryption using a pair of keys (public and private) where one key encrypts and the other decrypts.

Signup and view all the flashcards

Public Key

A key used to encrypt data, which can only be decrypted by the corresponding private key.

Signup and view all the flashcards

Private Key

A key used to decrypt data encrypted with the corresponding public key.

Signup and view all the flashcards

Digital Signatures

Used to verify the sender and integrity of a message. A private key creates the signature, a public key verifies it.

Signup and view all the flashcards

Hash Function

A function that takes input of any size and produces a fixed-size output (hash).

Signup and view all the flashcards

Study Notes

Caesar Cipher

  • Each letter is shifted three places down the alphabet (e.g., A becomes D, F becomes I).

Vigenère Cipher

  • Takes plaintext and a keyword to create ciphertext.
  • The plaintext letter is the row key, and the keyword letter is the column key.
  • The corresponding letter is the cipher letter.

Stream Ciphers

  • Encryption and decryption are performed on a stream of data (e.g., bitwise XOR with a key).

Padding

  • A cryptographic message syntax (CMS) from RFC 5656.
  • Pads the trailing end with a value equal to k - (i mod k) octets.
    • Example: 8-byte key, 12-byte message = 4 padding bytes of value 4.
  • S-boxes substitute data blocks using a lookup table. This obscures the relationship between the key and the ciphertext. Each ciphertext bit relies on multiple key parts.
  • P-boxes permute bits (rearrange, repeat, or discard).

Key Schedules

  • Generate multiple round keys from the initial key.
  • Enhances the complexity of the encryption process.
  • Each round uses different subkeys, making it difficult to relate plaintext to ciphertext.

Modes of Operation

  • Electronic Codebook (ECB): Encrypts each block individually (less secure).
  • Cipher Block Chaining (CBC): Links blocks using XOR, improving security. Uses an Initialization Vector (IV).

Advanced Encryption Standard (AES)

  • Modern symmetric encryption.
  • Uses substitution and permutation network.
  • 128, 192, or 256 bit key sizes.
  • 10, 12, or 14 rounds.
  • Data is structured as matrices (tables).
  • Steps within each round:
    • SubBytes: Performs substitutions.
    • ShiftRows: Shifts rows.
    • MixColumns: Mixes columns.
    • AddRoundKey: XORs with round key.
  • The final round does not include MixColumns.

Public Key Cryptography

  • Solves key distribution problems.
  • Uses a key pair:
    • Private key (secret).
    • Public key (shared).
  • Encrypts with public key and decrypts with private key.
  • Provides confidentiality (encrypt with recipient's public key) and authenticity (encrypt with sender's private key).
  • Layered encryption can ensure both confidentiality and authenticity.

Digital Signatures

  • Provides integrity and authentication for messages.
  • Uses a private key to sign a message, and a public key to verify it.
  • Ensures the message wasn't altered and is from the claimed sender.
  • Hash functions manage varying message sizes.
  • Collision resistance prevents similar messages from producing identical hashes.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Week 3 notes.docx

More Like This

Encryption Techniques in Informatics
10 questions
Seguretat i Criptografia en Java
45 questions
Introduction to Cryptography
76 questions
IT-Sicherheit Kapitel 2 - Kryptographie
55 questions
Use Quizgecko on...
Browser
Browser