Symmetric Encryption II

0.0(0)
Studied by 6 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:06 PM on 3/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

In the classification of cryptography, what are the two main sub-branches of cryptology?

Cryptography and Cryptanalysis.

2
New cards

What two categories is modern symmetric key cryptography divided into?

Block Ciphers and Stream Ciphers.

3
New cards

Which specific property of identity is achieved when both non-forgeability and non-mutability are present?

Nonrepudiation

4
New cards

What is the fixed block length b typically used in modern block ciphers like AES?

128 bits

5
New cards

Why is padding necessary for block ciphers?

Block ciphers require the plaintext length n to be a multiple of the block size b.

6
New cards

Under the PKCS5 standard, what is the assumed fixed block size?

8 bytes

7
New cards

How does the PKCS7 padding method indicate the length of the padding added to a block?

It uses a sequence of identical bytes where each byte's value equals the number of padding bytes.

8
New cards

If a 16-byte block cipher is used to encrypt the 7-character string "Roberto", how many padding bytes are required?

9 bytes

9
New cards

In PKCS7 padding, what is the value of each padding byte if 4 bytes of padding are needed to complete a block?

4

10
New cards

Which classical block cipher treats English letters as numbers modulo 26 and uses an n x n matrix as a key?

The Hill Cipher

11
New cards

What mathematical property must the key matrix K possess to be valid for a Hill Cipher?

The matrix must be invertible modulo 26.

12
New cards

What is the encryption formula for a Hill Cipher given key matrix K and message vector M?

C = K * M mod 26

13
New cards

How is the decryption matrix D calculated for a Hill Cipher if the key matrix K is known?

D = K-1 mod 26

14
New cards

Which cipher type functions by shuffling the positions of plaintext characters according to a specific permutation?

Transposition Cipher

15
New cards

In a transposition cipher, what serves as the decryption key relative to the encryption permutation pi?

The inverse permutation pi-1.

16
New cards

How can a transposition cipher be mathematically represented using the Hill Cipher framework?

It can be represented using a permutation matrix as the key matrix K.

17
New cards

To what type of attack are Hill Ciphers particularly vulnerable due to their linear nature?

Known plaintext attacks.

18
New cards

What was the official encryption standard used by the U.S. from 1976 until 2005?

Data Encryption Standard (DES).

19
New cards

What is the effective key length of DES after dropping the parity bits from the initial 64-bit key?

56 bits

20
New cards

Which variant of DES uses three separate 56-bit keys to enhance security?

Triple DES

21
New cards

What is the main security weakness of the original DES algorithm in modern computing?

The 56-bit key size is small enough for a computer to brute force all possible keys.

22
New cards

The current standard that replaced DES and supports 128-bit blocks is called _____.

Advanced Encryption Standard (AES)

23
New cards

What are the three supported key lengths for the AES algorithm?

128, 192, and 256 bits.

24
New cards

How many rounds are performed in the 128-bit version of the AES encryption algorithm?

10 rounds

25
New cards

In AES, what is the name of the 128-bit array that undergoes transformations in each round?

State

26
New cards

What operation is performed to create the initial state X0 in AES given plaintext P and key K?

X0 = P XOR K

27
New cards

The AES step involving an S-box substitution to transform bytes is called _____.

SubBytes

28
New cards

Which AES round step performs a permutation by cyclically shifting the rows of the state matrix?

ShiftRows

29
New cards

Which AES round step involves matrix multiplication to provide diffusion across the columns?

MixColumns

30
New cards

The AES step where the state is combined with a subkey using the XOR operation is called _____.

AddRoundKey

31
New cards

In the AES S-box lookup, which part of the 8-bit value determines the row index?

The leftmost 4 bits.

32
New cards

In the AES S-box lookup, which part of the 8-bit value determines the column index?

The rightmost 4 bits.

33
New cards

What is the block size of the AES algorithm?

128 bits

34
New cards

Which organization selected the final algorithm for the Advanced Encryption Standard in 1997?

National Institute for Standards and Technology (NIST).

35
New cards

If the determinant of a Hill Cipher key matrix K is d, what is the formula for the decryption matrix D?

D = [(d-1 mod 26)(d(K))] mod 26

36
New cards

How does an attacker determine the key for a transposition cipher given sufficient plaintext and ciphertext?

By examining the destination of each character position from the plaintext to the ciphertext.

37
New cards

What is the peak performance of the El Capitan supercomputer mentioned as a context for brute force capabilities?

1.8 Exa Flop/s

38
New cards

Which term describes the number of characters needed to uniquely determine a key through brute force?

Unicity distance

39
New cards

What was the intended lifespan of DES when it was first adopted in 1976?

10 to 15 years

40
New cards

In AES-128, which state is designated as the final ciphertext C?

X10

41
New cards

The sub-branch of cryptology focused on breaking codes is called _____.

Cryptanalysis

42
New cards

In the context of the Hill Cipher, how are the letters of the English alphabet represented numerically?

A through Z are mapped to the numbers 0 through 25.

43
New cards

When encrypting with AES, how many rounds are used for a 256-bit key?

14 rounds

44
New cards

Which symmetric cipher uses a key matrix K to transform a column vector of plaintext into a column vector of ciphertext?

The Hill Cipher

45
New cards

Why is 'padding with just zeroes' considered ambiguous in block ciphers?

It is impossible to distinguish between added padding zeroes and legitimate data zeroes at the end of a message.

46
New cards

What is the block size of the Data Encryption Standard (DES)?

64 bits

47
New cards

In modern cryptography, a cipher that processes input one block at a time is called a _____.

Block Cipher

48
New cards

What is the primary difference between PKCS5 and PKCS7 padding?

PKCS5 is defined specifically for 8-byte blocks, while PKCS7 allows for arbitrary block sizes.

49
New cards

How is a plaintext message of length n bits partitioned for encryption in a block cipher with block size b?

It is divided into a sequence of m blocks M[0], …, M[m-1].

50
New cards

In a Hill Cipher example where det(K) = 433, what is the modular inverse of the determinant modulo 26?

23

Explore top notes

note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)
note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)

Explore top flashcards

flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)
flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)