Symmetric Encryption and Block Ciphers

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

Vocabulary terms covering symmetric cryptography, block cipher structures like the Feistel cipher, common attack models, and modes of operation such as ECB, CBC, and Counter Mode.

Last updated 11:29 PM on 5/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Symmetric Encryption

An encryption scheme where both the sender and the receiver share the same key for encryption and decryption.

2
New cards

Stream Cipher

A type of symmetric encryption that uses a shared secret key to generate an arbitrarily long sequence of random-looking bits, which are then XORed with the message.

3
New cards

Block Cipher

An encryption scheme that takes a fixed-size message (e.g., 6464 bits) and outputs a ciphertext of the same size based on a key.

4
New cards

Feistel Structure

A high-level design used in block ciphers where the message is split into two halves; the right half is processed through a function ff with a key and XORed with the left half to create a new state, which is then repeated over multiple rounds.

5
New cards

DES (Data Encryption Standard)

An ancient block cipher from the 1970s that uses a 6464-bit block size, a 5656-bit key, and 1616 rounds of the Feistel structure.

6
New cards

Kirchhoff's Principle

The cryptographic principle assuming that the attacker knows exactly how the cryptosystem works (the algorithm, functions, and key schedule) and that the only secret is the key.

7
New cards

Ciphertext-only Attack

A type of attack where the attacker only has access to ciphertexts and does not know the underlying messages or the secret key.

8
New cards

Brute Force Attack

An exhaustive search for the secret key by trying every possible key until the correct one is found, typically requiring a known message-ciphertext pair.

9
New cards

Malleability

A property of a cryptosystem where an attacker can modify a ciphertext to produce a predictable change in the underlying message without knowing the secret key.

10
New cards

Distinguishability

A high-level security property where an attacker, given a ciphertext, cannot determine if it corresponds to message m0m_0 or message m1m_1 with a probability higher than random guessing.

11
New cards

Electronic Code Book (ECB)

The simplest mode of operation for block ciphers where a document is chopped into blocks of fixed length and each block is encrypted separately using the same key.

12
New cards

Initial Value (IV)

A random, non-secret value chosen by the sender and sent with the ciphertext to introduce freshness and ensure that identical messages encrypt to different ciphertexts.

13
New cards

Cipher Block Chaining (CBC)

A mode of operation where each message block is XORed with the previous ciphertext block before being encrypted, using an IV for the first block.

14
New cards

Counter Mode

A mode of operation that turns a block cipher into a stream cipher by encrypting a combination of an initial value and an incrementing counter to generate a key stream.

15
New cards

Mode of Operation

A technique for using a fixed-sized block cipher to encrypt an arbitrarily large document.