Crypto 2
Crypto 2
TIME/PART TIME
Confidentiality: To ensure that only the intended recipient can read the message
and prevent unauthorized parties from accessing the information.
Integrity: To ensure that the message has not been altered in transit and that
the recipient receives the exact message that the sender sent.
Authentication: To ensure that the sender and recipient of a message are who
they claim to be.
Non-repudiation: To prevent the sender of a message from denying that they
sent the message.
c) Discuss in detail the different ways of classifying classical cyphers and modern cyphers.
6 Marks
d) Discuss any four components of the Public Key Infrastructure (PKI) 4 Marks
e) Certificate Authority (CA): The trusted third party responsible for issuing,
revoking, and managing digital certificates.
f) Registration Authority (RA): The entity responsible for verifying the identity of
users before issuing digital certificates on behalf of the CA.
g) Certificate Repository: The database or directory where digital certificates are
stored and retrieved.
h) Certificate Revocation List (CRL): A list of revoked digital certificates that is
maintained by the CA and used by users to determine if a certificate is still valid.
With the aid of relevant diagrams, discuss how the Data Encryption Standard (DES) algorithm
operates.
Key generation: A 64-bit key is generated, but only 56 bits are used for
encryption while the remaining 8 bits are used for parity checking.
Key permutation: The key is permuted using a fixed table to produce a modified
56-bit key.
Key splitting: The modified key is split into two 28-bit halves and each half is
shifted left by one or two bits to create two new keys.
Subkey generation: The shifted halves are combined and permuted to produce
16 subkeys, each 48 bits long.
Data encryption: The plaintext is split into 64-bit blocks and undergoes an initial
permutation. The resulting block is then split into two 32-bit halves that
undergo a series of 16 rounds of substitution and permutation using the
subkeys. The resulting blocks are then swapped and undergo a final
permutation to produce the ciphertext.
Brute force attacks: Trying every possible key until the correct one is found.
Dictionary attacks: Trying a list of commonly used passwords or words until the
correct one is found.
Side-channel attacks: Exploiting weaknesses in the implementation of the
algorithm, such as power consumption, electromagnetic radiation, or timing
differences.
Known plaintext attacks: When an attacker has access to both the plaintext and
the corresponding ciphertext, they can use this information to determine the
key.
Chosen plaintext attacks: An attacker can choose plaintext and observe the
resulting ciphertext to learn information about the key.
d) Relations between encryption and signature methods became possible with the
"digitalization" of both and the introduction of the computational-complexity approach
to security.
(i) State the TWO requirements that a scheme for unforgeable signatures must
possess. 2 Marks
(i) State the requirements for a scheme that would perform message authentication
2 Marks
1. It must be able to verify the authenticity of the sender of the message.
2. It must ensure the integrity of the message, meaning that the message has not
been tampered with during transmission.
3. It must provide non-repudiation, meaning that the sender cannot later deny
having sent the message.
Known plain-text attack: In this case, the attacker knows the plain
text and cipher text, and they try to calculate the key by reverse
engineering the cipher.
Cipher-only attack: The attacker knows the cipher of different
messages encrypted using the key. They try to calculate the key using
the ciphers provided.
Chosen plain-text attack: This attack is similar to the known plain-
text attack, but now the attacker chooses a plain text of their own
choice and then generates the cipher against them using the key. Now
the attacker tries to calculate the key using the chosen plain text and
the corresponding cipher.
Chosen cipher-text attack: The attacker chooses a cipher text and
decrypted text portion of the cipher. The attacker then uses this to
figure out the key.
Replay attack: In this attack, the attacker captures some of the
authentication information and resubmits it to the server to gain access
to the information meant for the original owner only.
Brute force: It is the method of trying all the possible combinations
to figure out the key. It may be relatively easier if the size of the key is
smaller, but if the size of the key increases, it becomes computationally
infeasible to test all the options.
The rainbow table itself refers to a precomputed table that contains the password
hash value for each plain text character used during the authentication process. If
hackers gain access to the list of password hashes, they can crack all passwords
very quickly with a rainbow table.