Computer Security: Chapter 4: Block Ciphers and the Data Encryption Standard (DES)

studied byStudied by 36 people
5.0(1)
Get a hint
Hint

Block Cipher

1 / 22

flashcard set

Earn XP

Description and Tags

23 Terms

1

Block Cipher

  • Processes messages in blocks, each of which is encrypted/decrypted

  • Many current ciphers are block ciphers

  • They have a broader range of applications

  • Block Ciphers look like an extremely large substitution

  • LENGTH: 64-BITS, 128-BITS

New cards
2

Stream Cipher

  • Processes messages a bit or byte at a time when encrypting/decrypting

  • LENGTH: BIT OR BYTE

  • Stream cipher is faster than Block Cipher

New cards
3

When an encryption algorithm takes the input bit by bit or byte by byte, this is called ……… ?

A Stream Cipher

New cards
4
<p>A Comparison between Stream and Block Cipher </p>

A Comparison between Stream and Block Cipher

  • Memorize the photo attached

  • Resource @Neso Academy on YT

  • Video:

New cards
5

Block Cipher Principles

  • Most symmetric block ciphers are based on Feistel Cipher Structure

  • Needed to decrypt cipher text to recover messages efficiently

New cards
6
<p>What does an <strong><em>Ideal Block Cipher</em></strong> look like? </p>

What does an Ideal Block Cipher look like?

  • It takes a 4-bit input and results in a 4-bit output

  • An ideal block cipher is a cryptographic algorithm that encrypts fixed-size blocks of plaintext into ciphertext using a key.

  • It should be resistant to attacks like differential and linear cryptanalysis.

New cards
7

Claude Shannon

  • He introduced the idea of substitution-permutation (S-P) networks

New cards
8

Substitution-Permutation(S-P) Networks

  • S-P nets are based on 2 primitive cryptographic operations

  • The two operations are: (S-box) for Substitution and (P-box) for Permutation

  • They provide Confusion and Diffusion of message & key

New cards
9

Diffusion

  • Dissipates statistical structure of plaintext over the bulk of cipher text

  • 1-bit change in the plain text (PT) leads to a significant effect on the cipher text (CT) and that’s Diffusion

EXAMPLE: Transposition OR Permutation

New cards
10

Confusion

Makes relationship between cipher text and key as complex as possible

EXAMPLE: Substitution

New cards
11

Combining (S&P) elements results in obtaining:

Diffusion and Confusion

New cards
12

Data Encryption Standard (DES)

  • The most widely used block cipher in the world

  • Encrypts 64-bit data using 56-bit key

  • Has controversy over its security

  • DES exhibits a strong Avalanche Effect

New cards
13

DES Decryption

  • With Feistel Design, the same encryption steps but using SUB KEYS in REVERSE ORDER

New cards
14

Differential Cryptanalysis

  • Powerful method to analyze block ciphers

  • Used to analyze most current block ciphers with varying degrees of success

New cards
15

Linear Cryptanalysis

  • Must be iterated over rounds, with decreasing probabilities

  •  Based on finding linear approximations

New cards
16

What does a Timing Attack exploit?

  • A timing attack exploits the fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs.

New cards
17

REVIEW QUESTIONS FROM THE BOOK! (THEORY)

Question 1:

What is the difference between a stream cipher and a block cipher?

Answer:

  • A stream cipher processes messages a bit or byte at a time while encrypting/decrypting.

  • A block cipher processes messages in blocks, each of which is encrypted/decrypted

New cards
18

REVIEW QUESTIONS FROM THE BOOK! (THEORY)

Question 2:

 Briefly define the terms Substitution and Permutation.

Answer:

  • Substitution is a cryptographic operation that replaces one element with another based on a predefined rule or mapping.

  • Permutation rearranges the order or position of elements in a sequence or block.

New cards
19

REVIEW QUESTIONS FROM THE BOOK! (THEORY)

 

Question 3:

What is the strict avalanche criterion for the Feistel F function?

Answer:

  • The strict avalanche criterion refers to the property of a Feistel F function, where a small change in input results in a significant and unpredictable change in output, exhibiting STRONG DIFFUSION.

New cards
20

REVIEW QUESTIONS FROM THE BOOK! (THEORY)

Question 4:

  1. Which parameters and design choices determine the actual algorithm of a Feistel cipher?

Answer:

  • The actual algorithm of a Feistel cipher is determined by choices such as:

    1- The number of rounds

    2- The size of the blocks

    3- The key schedule

    4- The round function

    5- The specific key used

New cards
21

REVIEW QUESTIONS FROM THE BOOK! (THEORY)

Question 5:

What are the critical aspects of Feistel cipher design?

Answer:

  • Choice of the round function

  • The number of rounds for sufficient security

  • The key management

  • The overall balance between confusion and diffusion properties

New cards
23
<p>This uploaded document unlocks a page to view whenever you watch an ad. (It has MCQ and T/F questions)</p>

This uploaded document unlocks a page to view whenever you watch an ad. (It has MCQ and T/F questions)

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 65 people
... ago
5.0(3)
note Note
studied byStudied by 31 people
... ago
5.0(2)
note Note
studied byStudied by 18 people
... ago
4.7(3)
note Note
studied byStudied by 9 people
... ago
5.0(2)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 37255 people
... ago
4.9(189)

Explore top flashcards

flashcards Flashcard (34)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 27 people
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (101)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (141)
studied byStudied by 13 people
... ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 1473 people
... ago
5.0(5)
flashcards Flashcard (25)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (245)
studied byStudied by 561 people
... ago
4.8(18)
robot