Professional Documents
Culture Documents
1
Search C
Helpful 1 Unhelpful
Page 1 of 2 쇮
1) Chapter 1:
Know the tree of Cryptology. Describe the difference between Cryptography and
Cryptanalysis as aspects of Cryptology. Describe and give examples of the
different types of Cryptography and Cryptanalysis.
What is Symmetric Cryptography? Basic ideas about Symmetric Key
Cryptosystem (Fig. 1.5, page 5).
Learn about Kerckhoff's Principle and why do we care about this in Cryptanalysis.
Study well about Modular Arithmetic (specifically how to add, subtract, multiply
and finding the inverses)
What is Substitution Cipher? Describe two attacks on Substitution Cipher?
Shift Cipher and Affine Cipher. Make sure you understand for both ciphers
§ encryption and decryption equations formulas
§ the key spaces
§ two attacks on both ciphers which we discussed in class
§ If I give you few letters, you should be able to encrypt and decrypt.
2) Chapter 2:
What is the stream cipher and block cipher? Describe the differences between
stream ciphers and block ciphers. Discuss the positives and negatives of using
stream ciphers. Discuss the positives and negatives of using block ciphers.
Encryption and decryption with stream ciphers
Random Number Generators (RNGs) and its branches TRNG, PRNG, CTRNG.
You should understand each of the branches and make a table with construction,
statistical properties, cryptographic properties and efficiency. Also know
examples for TRNG and PRNG which were mentioned on the slides.
What is One Time Pad (OTP)? Advantages and disadvantages about OTP.
LFSRs: make sure you understand how to construct LFSRs from the polynomial
and how to generate key steams and find the period if the seeds are given.
Understand what is primitive, irreducible and reducible polynomials (Problem
2.8).
3) Chapter 3:
DES Facts
What is Claude Shannon's idea about strong encryption algorithm? Make sure to
study the definition of Confusion and Diffusion.
Answer:
Know the tree of Cryptology. Describe the di7erence between Cryptography
and Cryptanalysis as aspects of Cryptology. Describe and give examples of the
di7erent types of Cryptography and Cryptanalysis.
Cryptography is the practice of communicating securely in the presence of third
parties. Cryptanalysis is the study of methods for deciphering encrypted data
without access to the secret key. Email, Xle sharing, and secure communications
are all applications that use cryptography. Cryptanalysis is used in many
applications, such as email, Xle sharing, and secure communications. Secure
communication in the presence of outside parties is practiced through the use of
cryptography. Cryptanalysis is the study of techniques for understanding
encrypted data without having the key needed to decrypt it.
Positives:
-Stream ciphers are very fast and e\cient.
-They can be very di\cult to break if used correctly.
Negatives:
-Stream ciphers can be very vulnerable to attack if not used correctly.
-They can be di\cult to implement correctly.
Positives:
-Block ciphers are very fast and e\cient.
-They are relatively simple to implement.
-Block ciphers are very versatile and can be used in a variety of applications.
Negatives:
-Block ciphers can be susceptible to chosen-plaintext attacks.
-Block ciphers can be susceptible to known-plaintext attacks.
-Block ciphers can be susceptible to chosen-ciphertext attacks.
What is One Time Pad (OTP)? Advantages and disadvantages about OTP.
A sort of encryption that cannot be broken is a one-time pad. A random number
sequence that is as long as the message being encrypted serves as the key. The
message is encrypted using the key, which is subsequently destroyed. It is
impossible for someone without the key to read the message because it can only
be decoded with the key. A one-time pad has the beneXt of being unbreakable.
The drawback is that the key can only be used once before being destroyed. The
one-time pad would be rendered useless if the key was not destroyed because it
might then be used to decipher subsequent communications.
A One-Time Password (OTP) is a password that is valid for only one use.
Advantages:
-It is more secure than a static password because it cannot be guessed or stolen.
-It can be used to authenticate a user for a single transaction, after which it
becomes invalid.
Disadvantages:
-It can be inconvenient for the user, who must remember or store the password
somewhere securely.
-If the password is lost or stolen, it cannot be recovered.
Explain how to construct LFSRs from the polynomial and how to generate key
steams and Hnd the period if the seeds are given.
To construct an LFSR from a polynomial, one must Xrst determine the order of the
polynomial. This is done by Xnding the degree of the polynomial. The degree of a
polynomial is the highest exponent of the variable in the polynomial. For example,
the degree of the polynomial x^3 + x + 1 is 3. Once the degree of the polynomial is
known, one can determine the number of taps needed for the LFSR. The number
of taps is equal to the degree of the polynomial plus one. For example, the LFSR
for the polynomial x^3 + x + 1 would have four taps.
To generate keystreams from LFSRs, one must Xrst determine the taps of the
LFSR. The taps are the bits that are exclusive-or'ed together to generate the next
bit in the keystream. For example, the taps for the LFSR x^3 + x + 1 would be the
bits in positions 3, 2, and 0. To generate a keystream, one must start with a seed.
The seed is a string of bits that is used to initialize the LFSR. For example, the
seed for the LFSR x^3 + x + 1 could be 011. Once the seed is chosen, the LFSR is
clocked, meaning that the bits in the LFSR are shifted to the right by one position.
The bit that is shifted out of the LFSR is exclusive-or'ed with the taps, and the
result is the next bit in the keystream. This process is repeated until the keystream
is the desired length.
The period of an LFSR is the number of clock cycles it takes for the LFSR to
return to its original state. For example, the LFSR x^3 + x + 1 has a period of 7. This
means that after 7 clock cycles, the LFSR will be in the same state as it was after
the Xrst clock cycle.
What is Claude Shannon's idea about strong encryption algorithm? Make sure
to study the deHnition of Confusion and Di7usion.
Shannon stated that a strong encryption method should contain both confusion
and di^usion in his article "Communication Theory of Secrecy Systems." By
obscuring the connection between the plaintext and the ciphertext, confusion can
be used to create ciphers that are challenging to crack. Di^usion is the process of
dispersing encrypted data so that it is challenging to detect patterns. According to
Shannon, a safe encryption method must contain both confusion and di^usion to
be e^ective. Later cryptographers discovered that it is feasible to design an
algorithm that only had one of these characteristics. For instance, the Advanced
Encryption Standard (AES) has both confusion and dissemination, whereas the
Data Encryption Standard (DES) only has confusion.
Step-by-Step explanation
Key references:
Ke, Y., Zhang, M. Q., Liu, J., Su, T. T., & Yang, X. Y. (2019). Generative
steganography with Kerckho^s' principle. Multimedia Tools and Applications,
78(10), 13805-13818.
Li, M., Lu, D., Xiang, Y., Zhang, Y., & Ren, H. (2019). Cryptanalysis and
improvement in a chaotic image cipher using two-round permutation and
di^usion. Nonlinear Dynamics, 96(1), 31-47.
Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020). A novel
hybrid secure image encryption based on julia set of fractals and 3D Lorenz
chaotic map. Entropy, 22(3), 274.
Sajja, A., Mandrumaka, K. K., & Punnam, S. (2021). WALLACE TREE HIGH
PERFORMANCE STRATEGY FOR DATA PRIVACY EMPLOYING ELLIPTIC
CURVE CRYPTOLOGY. PalArch's Journal of Archaeology of
Egypt/Egyptology, 18(09), 561-575.
• DES construction (i.e. Input/output size, initial key size before PC-1 and key
size, the number of rounds, number of S-boxes which are non-linear (you should
be able to show non-liniarity, Problem 2.1), inputs and outputs sizes in S-boxes)
• In each round we have diffusion layer and confusion layer. Make sure you know
which one is which.
• Big idea of DES decryption, do not go in too much details (i.e. If I give you DES
encryption, you should be able to write decryption based on encryption of DES or
vice versa. Know how DES encryption and decryption are related, you do not
need to prove what we did in class.)
• Security of the DES
4) Chapter 4:
• Define commutative groups. Are (ℤ#,∗) and (ℤ# , +) groups? Why?
• What is Finite Fields? When can we have finite fields (Hint: prime power)?
• How to construct GF( ࠵? ࠵?) and how to do operations on such field (i.e. addition,
subtraction, multiplication and division)? Note that if I ask you division I will
provide you the table with inversion, you just need to be able to read it.
• AES construction (i.e. Input size, key size, output size, the number of rounds, how
many layers in each round and brief explanation what are we doing in each layer?
Where the Cloud Shannon's principal are applicable?)
• Big idea of decryption of the AES do not go in too much detail. (i.e. If I give you
AES encryption, you should be able to write decryption base on encryption of
AES or vice versa)
• Security of the AES
TITLE
SCHOOL
COURSE TITLE
CSCI 360
UPLOADED BY
emojica82
PAGES
TERM
Fall 2016
About Us iOS
Careers Android
Sitemap Tutors
Q&A Archive
Educator Events
Flashcards FAQ
Feedback
Attributions Instagram