Information Security Quiz 3

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:00 AM on 2/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

87 Terms

1
New cards

Stream Cipher

A type of encryption that scrambles data one bit or character at a time by mixing it with a secret key; fast and useful for real-time communication.

2
New cards

Stream Cipher Key Requirement

The keystream must be shared between users in advance through an independent secure channel.

3
New cards

Block Cipher

Encrypts plaintext in fixed-size blocks, producing ciphertext blocks of equal length.

4
New cards

Typical Block Size

Block ciphers commonly use 64-bit or 128-bit blocks.

5
New cards

Block Cipher Key Type

Block ciphers use symmetric encryption keys shared between users.

6
New cards

Block Cipher Usage

Most network-based symmetric cryptographic applications use block ciphers.

7
New cards

Feistel Cipher

A cipher structure that splits data into two halves and repeatedly mixes them with subkeys through multiple rounds.

8
New cards

Feistel Cipher Structure

Alternates substitutions and permutations to encrypt data.

9
New cards

Substitution

Each plaintext element is replaced uniquely by a ciphertext element.

10
New cards

Permutation

The order of elements is rearranged without adding or deleting elements.

11
New cards

Feistel Cipher Origin

A practical application of Claude Shannon’s idea of alternating confusion and diffusion.

12
New cards

Feistel Round Process

Input is split into halves, right half is substituted with subkey, then halves are swapped.

13
New cards

Diffusion

A property where changing one small part of plaintext changes many ciphertext bits, hiding patterns.

14
New cards

Confusion

A property where the relationship between ciphertext and key is made as complex as possible.

15
New cards

Purpose of Diffusion and Confusion

Introduced by Claude Shannon to prevent cryptanalysis using statistical patterns.

16
New cards

Data Encryption Standard (DES)

A symmetric block cipher that encrypts 64-bit plaintext using a 56-bit key.

17
New cards

DES Processing Steps

Initial permutation, 16 Feistel rounds, swap halves, final inverse permutation.

18
New cards

DES Feistel Property

DES is a Feistel cipher except for its initial and final permutations.

19
New cards

DES Decryption

Decryption is identical to encryption but subkeys are applied in reverse order.

20
New cards

Initial Permutation in DES

The first computation step that reorders input bits.

21
New cards

Initial Permutation Bit Placement

Even bits go to the left half and odd bits go to the right half.

22
New cards

Initial Permutation Benefit

Regular structure makes it easy to implement in hardware.

23
New cards

Avalanche Effect

A desirable property where changing one input bit changes more than half the output bits.

24
New cards

DES Avalanche Strength

DES exhibits a strong avalanche effect.

25
New cards

DES Implementation Advantage

DES Feistel structure makes it simple to implement in standard logic.

26
New cards

DES Hardware Performance

Highly efficient in hardware (gigabits/sec).

27
New cards

DES Software Performance

Slower in software because bit-level permutations are expensive for CPUs.

28
New cards

DES Key Length Weakness

Standard DES uses a 56-bit key, vulnerable to brute-force attacks today.

29
New cards

Triple DES (3DES)

Applies DES three times to increase effective key length and security.

30
New cards

Modern Preference

AES is preferred over DES and 3DES in modern standards.

31
New cards

DES Modes of Operation

DES supports ECB, CBC, OFB, and CFB modes.

32
New cards

ECB Mode

Electronic Codebook mode.

33
New cards

CBC Mode

Cipher Block Chaining mode.

34
New cards

OFB Mode

Output Feedback mode.

35
New cards

CFB Mode

Cipher Feedback mode.

36
New cards

S-Box Purpose in DES

The substitution step improves diffusion by spreading bit changes across ciphertext.

37
New cards

Round Key Objective

Round keys derived from the main key maximize confusion and security.

38
New cards

DES Diffusion Strength

Changing one plaintext bit affects about 34 ciphertext bits.

39
New cards

DES Confusion Strength

Changing one key bit affects about 35 ciphertext bits.

40
New cards

Avalanche Effect Connection

Diffusion + confusion together produce the avalanche effect.

41
New cards

DES Keyspace Size

56-bit keys allow 2^56 ≈ 7.2 × 10^16 possible values.

42
New cards

DES Brute Force Feasibility

Brute force became possible with clusters (1997) and dedicated hardware (1998).

43
New cards

EFF DES Cracker

In 1998, EFF cracked DES in a few days using $222,000 hardware.

44
New cards

1999 DES Crack Time

Crack time reduced to 22 hours using combined methods.

45
New cards

Timing Attack

A method of extracting key info by measuring encryption/decryption execution time.

46
New cards

Timing Attack on DES

Unlikely to succeed against DES, 3DES, or AES in practice.

47
New cards

Block Cipher Rounds Principle

More rounds make cryptanalysis harder.

48
New cards

DES Round Security

If DES had 15 or fewer rounds, differential cryptanalysis would beat brute force.

49
New cards

Function F in Feistel Cipher

The nonlinear core function that provides security in Feistel designs.

50
New cards

Nonlinearity Importance

The more nonlinear F is, the harder cryptanalysis becomes.

51
New cards

Strict Avalanche Criterion (SAC)

A criterion requiring output bits to change significantly when one input bit changes.

52
New cards

Bit Independence Criterion (BIC)

A criterion ensuring output bit changes are independent of one another.

53
New cards

Key Schedule Algorithm

Generates one subkey per round, maximizing difficulty of deriving the main key.

54
New cards

Double DES

Uses two DES encryptions with two different keys.

55
New cards

Double DES Encryption Formula

C = E(K2, E(K1, P))

56
New cards

Double DES Decryption Formula

P = D(K1, D(K2, C))

57
New cards

Double DES Key Length

Appears to provide 112-bit key strength.

58
New cards

Meet-in-the-Middle Attack

Attack that reduces Double DES security by matching intermediate encryption values.

59
New cards

Meet-in-the-Middle Complexity

Requires 2^56 + 2^55 effort instead of 2^112.

60
New cards

Triple DES Security

Triple DES prevents meet-in-the-middle attacks and is much stronger than DES.

61
New cards

Triple DES Variants

Includes two-key EDE and three-key Triple DES.

62
New cards

Triple DES Status

More secure than DES but now deprecated in favor of AES.

63
New cards

Polynomial Arithmetic in Cryptography

Cryptographic computations can be modeled using polynomial-based arithmetic.

64
New cards

Polynomial Arithmetic Approaches

Ordinary polynomials, modulo p coefficients, or modulo p plus another polynomial.

65
New cards

Polynomial Arithmetic Purpose

Provides mathematical support for bit-level shift and XOR operations.

66
New cards

Polynomial Arithmetic Usage

Used widely in modern algorithms like AES.

67
New cards

Modular Polynomial Arithmetic

Computations in GF(2^n) using polynomials with coefficients modulo 2.

68
New cards

GF(2^n) Requirement

Must reduce results modulo an irreducible polynomial of degree n.

69
New cards

Polynomial Inverses

Inverses can always be found using an extended Euclidean algorithm.

70
New cards

Advanced Encryption Standard (AES)

Rijndael cipher, designed by Rijmen and Daemen, operating on 128-bit blocks.

71
New cards

AES Structure

Iterative cipher (not Feistel), processing full 4×4 byte state array each round.

72
New cards

AES Design Goals

Strong resistance to attacks, speed, compactness, and simplicity.

73
New cards

AES Round Counts

AES uses 10 rounds (128-bit), 12 rounds (192-bit), 14 rounds (256-bit).

74
New cards

AES Round Operations

SubBytes, ShiftRows, MixColumns, AddRoundKey.

75
New cards

SubBytes Operation

Byte substitution using lookup tables.

76
New cards

ShiftRows Operation

Row-based transposition shifting bytes across columns.

77
New cards

MixColumns Operation

Matrix multiplication mixing bytes within columns.

78
New cards

AddRoundKey Operation

XOR of state with the round key.

79
New cards

AES S-Box Rationale

Designed for low correlation between inputs and outputs and strong nonlinearity.

80
New cards

AES Nonlinearity Source

Comes from using multiplicative inverses.

81
New cards

ShiftRows Benefit

Spreads bytes across columns, improving diffusion.

82
New cards

MixColumns Benefit

Ensures strong mixing so all output bits depend on all input bits after a few rounds.

83
New cards

AES Decryption

Involves inverse operations: InvSubBytes, InvShiftRows, InvMixColumns.

84
New cards

XOR Reversibility

AddRoundKey is reversible because XOR is its own inverse.

85
New cards

AES Implementation Efficiency

AES is efficient on 8-bit and 32-bit processors using byte operations and lookup tables.

86
New cards

AES Table Optimization

Can use precomputed tables for faster round computation at ~4KB storage cost.

87
New cards

AES Selection Reason

Implementation efficiency was a major factor in choosing AES as the standard cipher.