Week 3 - Symmetric cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

mode of operation

A _______________ is used with a blockcipher to determine what to do with a message that is lager than the block size

2
New cards

electronic codebook

_________ mode is the weakest mode of operation. Blocks are processed independently so it can be done in parallel but patterns in the text are preserved.

3
New cards

cut and paste

_________ attacks are a weakness of ECB mode - attackers can tamper with data to find patterns in the cyphertext or manipulate data without the receiver knowing

4
New cards

cipher block chaining

___________ mode uses chaining: a plaintext block is XOR’d with the previous ciphertext block before being encrypted with the key.

To decrypt the block is decrypted with the key then XOR’d with the previous cyphertext (or IV for the first block)

5
New cards

initialization vector

A bit string the length of a block that is used as the first cyphertext to mask the first plaintext block

6
New cards

counter

_______ mode turns a block cipher into a stream cypher. An encrypted counter value is XOR’d with the plaintext

7
New cards

keystream

Used in CTR mode - it is made by encrypting the counter (which increments with each block) with a nonce. These can be encrypted in advance for speed purposes

8
New cards

nonce

Number used once - used with the counter to create a value to be encrypted (keystream) then XOR’d with the text in CTR mode

9
New cards

data origin authentication

verifying the source of data (authentication) and making sure it hasn’t been tampered with (integrity). Can also be used to ensure confidentiality during active attacks

10
New cards

message authentication code

provides authentication and integrity. This tag is created by computing a symmetric key with the message. The recipient checks the message with the shared key to check if the tag is the same

11
New cards

key separation

provides extra security by having the MAC and the encryption use a different key. This way one key can be kept safe if the other is compromised

12
New cards

galois counter

_______ mode provides confidentiality and data origin authentication. The encryption is the same as CTR mode but messages are sent with an authentication tag produced from encrypting a hash

13
New cards

hash function

takes an input of any length and outputs a fixed-length bitstring called a hash value. The same input always gives the same output. It provides ‘fingerprint’ for the data

14
New cards

collision resistance

a property of hash functions where if given the hash it is difficult to find different inputs that produce the same hash value

15
New cards

preimage resistance

when it is difficult to find the input message from the hash value. However it is still easy to compute the output from an input meaning it is a one-way-function

16
New cards

second preimage resistance

when given an input and the hash, it should be difficult to find a different input that hashes to the same output

17
New cards

secure hash algorithm

a family of hashing algorithms produced by NIST

18
New cards

digest length

the size of a hash value that a SHA produces, Longer means more security (more outputs, less collision)

19
New cards

MD5

was found to have many vulnerabilities and collisions can now be found in seconds (digest length 128)

20
New cards

SHA-0

this hash function was found to have a fatal flaw and was withdrawn shortly after publication (digest length 160)

21
New cards

SHA-1

this hash function is no longer safe and is in the process of being phased out. It has been cryptographically broken as collisions are cheap to compute on modern hardware (digest length 160)

22
New cards

SHA-256

the currently recommended hash function which is very widely used: the large digest gives it many outputs and it is resistant to known attacks (for now!)

23
New cards

file integrity check

one of the uses of SHA: by relying on second preimage resistance a downloaded file can be sent with its hash value to be verified by the receiver

24
New cards

dictionary attack

a more efficient way of brute-forcing passwords by going through common words, phrases or previously leaked passwords, hashing them then comparing to stolen hash values

25
New cards

salting

a method where a fixed value is concatenated with a password then hashed. When a user tries to log in the supplied password is concatenated and hashed then compared with the stored hash value.