Term
| what is the usage of linear feedback shift register in security? |
|
Definition
| stream cipher and block cipher will need it |
|
|
Term
| what is primitive polynomial? |
|
Definition
| a function that will give m-sequence |
|
|
Term
|
Definition
| binary sequence with period N, k consecutive 0s or 1s preceded by 1 and followed by 1 is a run with length k |
|
|
Term
| what is auto-correlation? |
|
Definition
| cross-correlation with itself |
|
|
Term
| how to compute auto-correlation? |
|
Definition
| a exor a shifted right by T bits. if exored bit is 1 then assign -1, if exored bit is 0 then assign 1. Then add them together |
|
|
Term
| what is auto-correlation useful at? |
|
Definition
| figuring out sequence of a sequence |
|
|
Term
| what is cross-correlation? |
|
Definition
| measures similarities of two sequences |
|
|
Term
| how to find period of sequence a and b from cross-correlation? |
|
Definition
| the resulting function is periodic |
|
|
Term
| in cross-correlation, what if two sequences have different length? |
|
Definition
|
|
Term
| Describe Golumb's three random properties for sequences |
|
Definition
1. number of 1 is 1 more than number of 0 2. (1/2)^k should have run (of 0 and 1) with length k 3. auto-correlation when not same is always -1 |
|
|
Term
| why is LFSR with m-sequence not good? |
|
Definition
| hacker can get 2n consecutive sequence and regover LFSR algorithm |
|
|
Term
|
Definition
|
|
Term
| give an example of how stop-and-go NL LFSR work |
|
Definition
|
|
Term
|
Definition
| Uses pseudorandom generator to produce cipher text |
|
|
Term
| is stream cipher symmetric key or public key crypto? |
|
Definition
|
|
Term
| describe one-time-pad principle and why it's important |
|
Definition
| key is used once -> key is unbreakable |
|
|
Term
| what are design principles of stream ciphers? |
|
Definition
1. stream cipher algoirhm is public(i.e everybody show know it) 2. only secrete is pre-shared key 3. hacker can intercept communication so they have ciphertext 4. hackers can also create ciphertexts |
|
|
Term
| what are two phases in stream cipher? |
|
Definition
|
|
Term
| what does v mean in bit wise operation? |
|
Definition
|
|
Term
| what does /\ mean in bit wise operation? |
|
Definition
|
|
Term
| what does + mean in bit wise operation? |
|
Definition
|
|
Term
|
Definition
| takes in IV and key, generate a random stream |
|
|
Term
| PSG usually use what to implement? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| how many times does KIA execute for each encryption session? |
|
Definition
|
|
Term
| usually what are used to implement PSG? |
|
Definition
|
|
Term
| why should low power be used for KIA and PSG? |
|
Definition
| to protect side-channel attacks |
|
|
Term
| describe how linear cryptanalysis works? |
|
Definition
|
|
Term
| describe how differential cryptanalysis works |
|
Definition
| difference between itself and time shifted version, or difference between two keys or messages |
|
|
Term
| describe how correlation attack works |
|
Definition
|
|
Term
| what's the requirement for time-space attack? |
|
Definition
| for N bits, sqrt(s^N) should exceed computatiblity of current computors |
|
|
Term
| What is the requirement for internal state of stream cipher |
|
Definition
| If internal state has n-bits, sqrt(2^n) should resist exhausive attack |
|
|
Term
| how to attack using birthday attack |
|
Definition
|
|
Term
| why should stream cipher algorithm be public? |
|
Definition
| give hacker a lot of power, if still the hacker can't crack it, then it's good |
|
|
Term
| A5/1 uses what LSFR model? |
|
Definition
| stop-and-go LFSR model, 64 stages |
|
|
Term
| how many cycles does A5/1 take to output? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| how many cycles does Grain 2 take to output? |
|
Definition
|
|
Term
|
Definition
| LSFR using vector, each holds 29 bits, 11 stages, linear span is 2^45 |
|
|
Term
| how many cycles does WG-29 take to output? |
|
Definition
|
|
Term
|
Definition
| output probability is unbalanced |
|
|
Term
| How did hackers hacked A5/1? |
|
Definition
| People reverse engineered |
|
|
Term
| draw a block cipher diagram |
|
Definition
|
|
Term
| what are differences between steam cipher and block cipher? |
|
Definition
stream is bit by bit, block is block by block. So performance wise block cipher might be faster generally. Generally steam cipher needs LFSR to compute output stream bit by bit, block cipher needs some state to mix a block up(using thing such as a LUT) |
|
|
Term
| how come requirements for stream cipher and block cipher are so different? |
|
Definition
| nature is different, stream cipher depends on function while block cipher depends on number of different operations |
|
|
Term
| what are two things block cipher require? |
|
Definition
| 1. diffusion and confusion |
|
|
Term
|
Definition
| if message is changed by 1 bit, then cipher should change totally |
|
|
Term
|
Definition
| if key is changed by 1 bit, then cipher should change totally |
|
|
Term
| what is a substitution box? |
|
Definition
| a small box that takes in m bits of data and transform it to m bits of data |
|
|
Term
| how to improve security of block cipher which uses s-box in block cipher? |
|
Definition
| perform algorithm in s-box many times(rounds) |
|
|
Term
| what are two structures in block cipher? |
|
Definition
1. Feistel structure(NLFSR) with input 2. substitute permutation network(a finite state machine) |
|
|
Term
| what is done in each round of block cipher? |
|
Definition
1. add keys 2. NL permutation S-box layer(diffusion) 3. linear permutation layer(confusion) |
|
|
Term
| how is cipher text produced in DES? |
|
Definition
| run 16 rounds, then internal state is cipher text |
|
|
Term
|
Definition
| since the key is 56 bits, using birthday attack can hack |
|
|
Term
| how many rounds are there in AES? |
|
Definition
|
|
Term
| DES belongs to where in block cipher? |
|
Definition
| Feistel structure(NLLFSR) |
|
|
Term
| how many bits is message for DES? |
|
Definition
|
|
Term
| how many bits is key for DES? |
|
Definition
|
|
Term
| how many bits is message for AES? |
|
Definition
|
|
Term
| how many bits is key for AES? |
|
Definition
|
|
Term
| are 8 bit cipher text in AES same? |
|
Definition
|
|
Term
| how is 128 bits represented in AES? |
|
Definition
| each 8 bit is a vector, there are 16 vectors in a matrix |
|
|
Term
| what's the usage of finite field? |
|
Definition
finite field is a way to allow add and mult for binary numbers. usually finite field is implemented in LUT, so computation of binary numbers are faster |
|
|
Term
| Describes the steps in AES |
|
Definition
1. inverse 2. affine transform 3. shift row transform 4. mix column transform |
|
|
Term
| total of how many bits of keys are encrypted in AES? |
|
Definition
| block length * (number of rounds + 1) |
|
|
Term
| what are two types of encryption modes for block cipher? |
|
Definition
1. block cipher mode 2. block cipher implemented as stream cipher |
|
|
Term
| what are two types of block cipher mode? |
|
Definition
1. electronic codebook mode 2. cipher block chaining mode |
|
|
Term
|
Definition
1. Electronic code mode 2. CBC mode 3. Cipher Feedback Mode 4. Counter Mode |
|
|
Term
| what are three requirements in Secure Hash Functions? |
|
Definition
1. collision resistance 2. second pre-image resistance 2. pre-image resistance |
|
|
Term
| what is second pre-image resistance and why it's important? |
|
Definition
find y st h(y) = h(x)
Because attacker, if able to find y st h(y) = h(x), can use y to pretend to be person who generated h(x). |
|
|
Term
| what is pre-image resistance and why it's important? |
|
Definition
given z, find x such that h(x) = z
Because attacker, if able to find y st h(y) = h(x), can use y to pretend to be person who generated h(x). |
|
|
Term
| what's the different reason why second pre-image resistance and pre-image resistance exist? |
|
Definition
1. pre-image: to impersonate Alice
2. second pre-image: to change Alice's data |
|
|
Term
| how many bits are input to SHA1? |
|
Definition
|
|
Term
| how many bits are output to SHA1? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| what are three ways MAC can be implemented? |
|
Definition
1. normal stream cipher mode 2. CBC mode 3. hash mode |
|
|
Term
| What does it mean by KIA and PSG should be public but protected? |
|
Definition
| it means design should be public, but they should resist attack |
|
|
Term
| Symmetric key and public key, which one causes lower overhead to computation? |
|
Definition
| symmetric key, recall AES in 128 bits is over 4000 bits in RSA. So as soon as symmetric key is computed, should switch to symmetric key |
|
|
Term
| What are two advantages of stream cipher compared to block cipher? |
|
Definition
1. one bit of error will result in output has one bit of error 2. stream cipher does not need to pad plain text, but block cipher need to |
|
|
Term
| what are two disadvantages of stream cipher compared to block cipher? |
|
Definition
1. design principles of steam ciphers are hardly realized 2.if message is short, initialization if relatively long |
|
|