100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C839-ECES--Cipher block-HASH-Cryptanalysis Questions and Answers

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
29-01-2025
Written in
2024/2025

C839-ECES--Cipher block-HASH-Cryptanalysis

Institution
Ece
Course
Ece









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Ece
Course
Ece

Document information

Uploaded on
January 29, 2025
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C839-ECES--Cipher block-HASH-
Cryptanalysis

AES Phases - answer1. Sub Bytes - non-linear substitution - uses Rijndael S-box
2. Shift rows - transposition
3. Mix Columns - mixing
4. Add Round Key

EC Formula - answer (y2 = x3 + Ax + B) - Developed by Victor Miller and Neil Koblitz in
1985

3 Cryptanalysis Resources - answer• Time (amount of time needed to perform the
number of calculations to crack encryption)
• Memory (the amount of storage required to perform the attack)
• Data (the amount of plaintext/ciphertext required for the attack)

Blowfish - answer Fastest Symmetric algorithm. Designed in 1993 by Bruce Schneier.
• Feistel cipher
• 16 rounds
• 64 bit blocks.
• Key size ranges from 32 to 448 bits.
• Designed as a replacement for DES.

DES - answerSymmetric algorithm - Block Cipher - Based on Lucifer Algorithm
• One of the most widely deployed algorithms in the world, even though it is no longer
recommended or considered secure.
• Restricted key size of 56 bits and small block size of 64 bits (has a 64-bit plaintext,
which is split into two 32-bit halves L and R).
• Consists of 16 rounds numbered 1 through 16. Each round i uses a separate 48-bit
round key Ki. Each round key is formed by selecting 48 bits from the 56-bit key, and this
selection is different for each round key.
• The algorithm that derives these round keys from the main block cipher key is called
the key schedule.

Digital Certificate - DC - answerStandard template is x.509 V3. It's been around since
1988 and it's the most commonly used format today. Used to identify the certificate
holder when conducting electronic transactions. When modified, they typically become
invalidated. The can expire as well or be revoked for a number of reasons (private key
compromised, etc). They are used for web servers, authentication of Cisco Secure
phones, E-Commerce. This is one of the most common methods to distribute public
keys.

, • Common Digital Certificate Fields - Certificate Information Statement, Issued to,
Issued by, Valid from
• Digital Certificate Details Fields - Version, Serial Number, Signature Algorithm, Hash
Algorithm, Issuer, Valid From, Valid To, Subject, Public Key, Key Usage Statement,
Friendly Name

Elliptic Curve Cryptography (EC or ECC) - answerAsymmetric Key Algorithm, provides
encryption, digital signatures, key exchange, based on the idea of using points on a
curve to define the public/private key, used in wireless devices and smart cards. The
security is based on the fact that finding the discrete logarithm of a random elliptic curve
element with respect to a publicly known base point is difficult to the point of being
impractical to do so.
(y2 = x3 + Ax + B) - Developed by Victor Miller and Neil Koblitz in 1985
• Elliptic Curve Diffie-Helmann (used for key exchange)
• Elliptic Curve Digital Signature Algorithm (ECDSA)
• Elliptic Curve MQV key agreement protocol

Feistel Function - answerNamed after German born physicist.
• Basis for most block ciphers.
• Split plaintext into 2 blocks, usually equal sizes.
• Each round consists of XORing L with F(Ki, R)
• As long as these are even, it is considered a traditional/normal Feistel Cipher. An
unbalanced Feistel Cipher is when the basket does not split evenly.

Hash - answerA one-way mathematical operation that reduces a message or data file
into a smaller fixed length output, or hash value.
• Takes variable-size input and returns a fixed size string.
• Iterative
• Typical length of 512 bits
• Examples: Gost, MD5, SHA, RIPEMD, FORK, TIGER
• Non-Reversible

Levels of NSA Encryption Algorithms - answer• Suite A Algorithms - Confidential, not
published, used for secret and top secret government communications. We have no
knowledge of them other than what's on this list is used by the government to securely
communicate.
• Suite B Algorithms - Commercially available and used in all modern software in one
way or another that are recommended by the NSA.
o Type 1 Suite B Algorithms - Juniper, Mayfly, Fast hash, Walburn, Pegasus, AES
(depending on implementation)
o Type 2 Suite B Algorithms - Skipjack, KEA
o Type 3 Suite B Algorithms - DES, 3DES, SHA1, AES (depending on implementation)
o Type 4 Suite B Algorithms - Not certified by government, but there may be public or
private sector algorithms that exist on this level.

RSA - answer• Most widely used asymmetric encryption algorithm

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
julianah420 Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
658
Member since
3 year
Number of followers
324
Documents
34114
Last sold
1 week ago
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

149 reviews

5
101
4
20
3
8
2
5
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions