Podcast
Questions and Answers
Which of the following is a characteristic of a stream cipher?
Which of the following is a characteristic of a stream cipher?
- Encrypts a digital data stream one bit or one byte at a time (correct)
- Encrypts data in fixed-size blocks
- Uses the same key for multiple encryption rounds
- Requires the key to be shorter than the plaintext
In the ideal case of a one-time pad version of the Vernam cipher, the keystream must be shorter than the plaintext bit stream.
In the ideal case of a one-time pad version of the Vernam cipher, the keystream must be shorter than the plaintext bit stream.
False (B)
What logistical problem arises when using a cryptographic keystream for encryption, especially when dealing with very large data traffic?
What logistical problem arises when using a cryptographic keystream for encryption, especially when dealing with very large data traffic?
Keystream distribution/management
A block of plaintext is treated as a ______ and used to produce a ciphertext block of equal length.
A block of plaintext is treated as a ______ and used to produce a ciphertext block of equal length.
What is a typical block size used in many block ciphers?
What is a typical block size used in many block ciphers?
Block ciphers and stream ciphers both require that two users share a symmetric encryption key.
Block ciphers and stream ciphers both require that two users share a symmetric encryption key.
What type of cryptographic applications primarily use block ciphers?
What type of cryptographic applications primarily use block ciphers?
Match the following terms related to the Feistel cipher with their descriptions:
Match the following terms related to the Feistel cipher with their descriptions:
In the context of cryptography, what does 'diffusion' refer to?
In the context of cryptography, what does 'diffusion' refer to?
The purpose of confusion in cryptography is to make the relationship between the statistical structure of the ciphertext and the encryption key as simple as possible.
The purpose of confusion in cryptography is to make the relationship between the statistical structure of the ciphertext and the encryption key as simple as possible.
According to Claude Shannon, name the two basic building blocks for any cryptographic system.
According to Claude Shannon, name the two basic building blocks for any cryptographic system.
In a Feistel cipher, ______ block sizes typically mean greater security but reduced encryption/decryption speed for a given algorithm.
In a Feistel cipher, ______ block sizes typically mean greater security but reduced encryption/decryption speed for a given algorithm.
Which of the following is a design feature that contributes to the strength of a Feistel cipher?
Which of the following is a design feature that contributes to the strength of a Feistel cipher?
A single round in a Feistel cipher is generally considered sufficient for providing adequate security.
A single round in a Feistel cipher is generally considered sufficient for providing adequate security.
From a cryptanalytic perspective, what impact should greater complexity in the subkey generation algorithm have?
From a cryptanalytic perspective, what impact should greater complexity in the subkey generation algorithm have?
The Data Encryption Standard (DES) was issued in 1977 by the National Bureau of Standards (now NIST) as Federal Information Processing Standard ______.
The Data Encryption Standard (DES) was issued in 1977 by the National Bureau of Standards (now NIST) as Federal Information Processing Standard ______.
When was the Advanced Encryption Standard (AES) introduced?
When was the Advanced Encryption Standard (AES) introduced?
In DES, different steps are used to reverse the encryption process.
In DES, different steps are used to reverse the encryption process.
How large are the blocks and the keylengths that DES encrypts data with?
How large are the blocks and the keylengths that DES encrypts data with?
The first step in the DES data computation process is called the ______.
The first step in the DES data computation process is called the ______.
What does the Initial Permutation (IP) primarily achieve in the DES algorithm?
What does the Initial Permutation (IP) primarily achieve in the DES algorithm?
The structure of the Initial Permutation (IP) in DES is irregular and difficult to implement in hardware.
The structure of the Initial Permutation (IP) in DES is irregular and difficult to implement in hardware.
In DES, the 32-bit R half is expanded to 48-bits using what?
In DES, the 32-bit R half is expanded to 48-bits using what?
After the expansion, the 48-bit output is then combined with a 48-bit subkey using the ______ operation.
After the expansion, the 48-bit output is then combined with a 48-bit subkey using the ______ operation.
What is the purpose of the S-boxes (Substitution Boxes) in DES?
What is the purpose of the S-boxes (Substitution Boxes) in DES?
In DES, row selection in S-boxes depends only on the data and not on the key.
In DES, row selection in S-boxes depends only on the data and not on the key.
What term describes the property where a small change in the input or key results in a significant change in the output?
What term describes the property where a small change in the input or key results in a significant change in the output?
The avalanche effect makes guessing keys ______.
The avalanche effect makes guessing keys ______.
What is typically considered to be the key desirable property of an encryption algorithm?
What is typically considered to be the key desirable property of an encryption algorithm?
DES does not exhibit avalanche.
DES does not exhibit avalanche.
Flashcards
Stream Cipher
Stream Cipher
Encrypts data one bit or byte at a time
Block Cipher
Block Cipher
A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length
Feistel Cipher
Feistel Cipher
A cipher that alternates substitutions and permutations
Diffusion and Confusion
Diffusion and Confusion
Signup and view all the flashcards
Diffusion
Diffusion
Signup and view all the flashcards
Confusion
Confusion
Signup and view all the flashcards
Block Size
Block Size
Signup and view all the flashcards
Key Size
Key Size
Signup and view all the flashcards
Number of Rounds
Number of Rounds
Signup and view all the flashcards
Subkey Generation Algorithm
Subkey Generation Algorithm
Signup and view all the flashcards
Round Function F
Round Function F
Signup and view all the flashcards
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Signup and view all the flashcards
DEA Encryption
DEA Encryption
Signup and view all the flashcards
Algorithm transforms data
Algorithm transforms data
Signup and view all the flashcards
Initial Permutation (IP)
Initial Permutation (IP)
Signup and view all the flashcards
Avalanche Effect
Avalanche Effect
Signup and view all the flashcards
Study Notes
Stream Cipher Basics
- Encrypts digital data streams one bit or byte at a time.
- Examples include Autokeyed Vigenère cipher and Vernam cipher
Ideal Stream Cipher
- The keystream should be as long as the plaintext bitstream, as in a one-time pad version of the Vernam cipher
- If the cryptographic keystream is random, the cipher is unbreakable except by acquiring the keystream
- Keystream must be provided to both users in advance via an independent, secure channel.
- Introducing logistical problems if the intended data traffic is large
Practical Stream Cipher
- Bit-stream generator must be implemented as an algorithmic procedure to produce the cryptographic bit stream
- Computationally impractical to predict future portions of the bit stream based on previous portions of the bit stream
- Two users need only share the generating key; each can produce the keystream
Block Cipher Basics
- Treats a block of plaintext as a whole and uses it to produce a ciphertext block of equal length.
- Typically uses a block size of 64 or 128 bits.
- Like stream ciphers, the two users share a symmetric encryption key
- Most symmetric cryptographic applications that are network-based use block ciphers
Feistel Cipher Key Points
- Proposed by Feistel
- Use of a cipher that alternates substitutions and permutations
- Is a practical application of Claude Shannon's proposal for a product cipher, alternating confusion and diffusion functions
- Used by many significant symmetric block ciphers
Substitution
- Each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements
Permutation
- No elements are added or deleted or replaced in the sequence; rather, the order in which the elements appear in the sequence is changed
Diffusion
- Introduced by Claude Shannon
- Dissipates the statistical structure of the plaintext into long-range statistics of the ciphertext
- Achieved by having each plaintext digit affect the value of many ciphertext digits
Confusion
- Seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible
- Complex enough that even if the attacker can infer stats of the ciphertext the attacker still unable to deduce the key
Feistel Cipher Design Features: Block Size
- Larger block sizes offer greater security
- Block size decreases encryption/decryption speed for a given algorithm
Feistel Cipher Design Features: Key Size
- Larger key sizes provide greater security
- larger key size may decrease encryption/decryption speeds
Feistel Cipher Design Features: Number of Rounds
- Minimum security can be achieved in a single round
- Multiple rounds offer increasing security
Feistel Cipher Design Features: Subkey Generation Algorithm
- Greater complexity in this algorithm leads to greater difficulty of cryptanalysis
- More complex algorithms for generating the subkeys will be more resilient to cryptanalysis
Feistel Cipher Design Features: Round Function F
- Greater complexity generally means greater resistance to cryptanalysis of the round function
Feistel Cipher Design Features: Fast Software Encryption/Decryption
- Encryption is embedded in applications/utility functions in a way that precludes hardware implementation, execution speed of the algorithm becomes a concern therefore the speed must be fast
- Should be easy to implement in software for fast encryption
Feistel Cipher Design Features: Ease of Analysis
- If the algorithm can be explained concisely and clearly, easier to analyze for cryptanalytic vulnerabilities
- Allows for a higher level of assurance as to its strength
Data Encryption Standard (DES)
- Issued in 1977 by the National Bureau of Standards (now NIST) as Federal Information Processing Standard 46
- Most widely used encryption scheme until the introduction of AES in 2001
- The algorithm is referred to as the Data Encryption Algorithm (DEA)
Data Encryption Standard (DES) Encryption Details
- 64-bit blocks are encrypted using a 56-bit key
- The algorithm transforms 64-bit input in a series of steps into a 64-bit output
- The same steps, with the same key, are used to reverse the encryption
Initial Permutation IP
- The first step of the data computation.
- Reorders the input data bits.
- Even bits go to the left hand side and the odd bits go to the right hand side
- Structure is quite regular, making it easy to implement in hardware
Feistel Cipher Round Details:
- Uses 2 32-bit L & R halves
- The left half L₁ = R(i-1)
- The right half R₁ = L(i-1) XOR F(R(i-1, K₁)
- F takes 32-bit R half and 48-bit subkey
- Expands R to 48-bits using perm E
- Adds to subkey using XOR
- Passes through 8 S-boxes to get 32-bit result
- Finally permutes using 32-bit perm P
- F is NOT a permutation
Substitution Boxes S
- Each S-box maps 6 to 4 bits.
- Each S-box is actually 4 little 4-bit boxes
- Outer bits are used to select the row of 4 possible 4 bit permutations
- The row selection depends on both data and key, known as autoclaving (autokeying)
- Inner bits are substituted
- 8 lots of 4 bits are returned, or 32 bits overall
Avalanche Effect
- Key desirable property of encryption alg is observed
- A change of one input or key bit results in changing approximately half of the output bits
- Makes efforts to "home-in/reverse engineer" impossible
- DES exhibits strong avalanche
DES Table 4.5 Summary
- Key size of 56 bits, exhaustive key search time required is 1.125 years
- Key size of 128 bits, exhaustive key search time required is 5.3 x 10^21 years
- Key size of 168 bits, exhaustive key search time required is 5.8 x 10^33 years
- Key size of 192 bits, exhaustive key search time required is 9.8 x 10^40 years
- Key size of 256 bits, exhaustive key search time required is 1.8 x 10^60 years
- 26 char permutation, exhaustive key search time required is 6.3 x 10^6 years
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.