1. Intro to Crypto Flashcards

Contains 1.1 - 1.3 Lecture content

1
Q

What is the main purpose of applying cryptography to secure systems?

A

To protect data from unauthorized access and ensure confidentiality, integrity, and authenticity

This includes using various cryptographic algorithms and principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main types of encryption?

A

Symmetric and Asymmetric encryption

Symmetric uses a single key, while Asymmetric uses a pair of public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define symmetric encryption.

A

An encryption method where the sender and receiver share the same secret key for data encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a ciphertext?

A

The encrypted message that is not human-readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of symmetric encryption algorithms?

A
  • Stream Ciphers
  • Block Ciphers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a stream cipher?

A

Encrypts data bit-by-bit or byte-by-byte in a continuous stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a block cipher?

A

Encrypts each block of data independently using the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define asymmetric encryption.

A

An encryption method that uses two different keys (public and private) for encrypting and decrypting messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the key difference between symmetric and asymmetric encryption?

A

Symmetric uses a single key, while asymmetric uses a pair of keys (public for encryption, private for decryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the fundamental features (primitives) of cryptography.

A
  • Confidentiality
  • Integrity
  • Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does confidentiality in cryptography ensure?

A

Keeps information secret from adversaries; achieved through encryption techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cryptanalysis?

A

The study of breaching cryptographic security systems to gain access to encrypted messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Differentiate between cryptanalysis and brute-force attacks.

A
  • Cryptanalysis: Analytical approach exploiting weaknesses in encryption.
  • Brute-force: Systematic approach testing every possible key combination.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the objective of a brute-force attack?

A

To output a human-readable plaintext that identifies the underlying secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the processing complexity of a brute-force attack for a 15 character password containing letters and digits?

A

2^90

Explanation:

  • Step 1: determine Character set size
    • Uppercase letters: 26 characters
    • Lowercase letters: 26 characters
    • Digits: 10 characters
    Total character set size = 26+26+10=62
  • Step 2: Calculate the total combinations
    • For a password of length L, the total combinations are:
      • 62^L
      • Here, L=15 , so the total combinations are: 62^{15}
  • Step 3: Approximate using Log
    • Use log base 2
    • log2 (62) = log10 (62) / log10 (2) = 5.95
  • 62^15 = (2^5.95) ^ 15 = (2 ^ 5.95 * 15) = 2 ^ 89.25 =⇒ 2^90
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the four types of cryptanalytic attacks based on information known.

A
  • Ciphertext-only
  • Known-plaintext
  • Chosen-Plaintext
  • Chosen-ciphertext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the key assumption of Kerckhoffs’s principle?

A

The key must be kept secret, even if everything about the algorithm is public knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is unconditional security in cryptography?

A

A cryptographic algorithm is unconditionally secure if the ciphertext lacks information to uniquely determine the corresponding plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is computational security?

A

Ciphertext/algorithm is difficult to decrypt using current or future resources, but not theoretically impossible.

20
Q

What are the three complexities to consider when analyzing attack feasibility?

A
  • Processing Complexity
  • Data Complexity
  • Storage Complexity
21
Q

What does processing complexity measure?

A

The time needed to perform the attack.

22
Q

What does data complexity refer to?

A

The amount of data needed as input to the attack.

23
Q

What is storage complexity?

A

The amount of memory needed to execute the attack.

24
Q

What is a shift cipher?

A

A method that replaces each character of the plaintext with a corresponding character of the ciphertext using a key.

25
What does the key in a shift cipher represent?
A number between 0 and 25 that indicates how many positions to shift each character.
26
What is the total number of unique characters in the English language considered in a shift cipher?
26 unique characters (a-z).
27
How is encryption performed in a shift cipher?
By shifting each plaintext character forward by k places, where k is the key.
28
What happens to characters when the sum exceeds 25 during encryption?
Characters wrap around to the start of the alphabet using the modulo operation.
29
What is the process of decryption in a shift cipher?
Shift the ciphertext characters backward by the same number of k places.
30
What is a mono-alphabetic cipher?
A cipher where each plaintext character is replaced by a corresponding character of ciphertext, maintaining a 1-1 mapping.
31
What are the two approaches for cryptanalysis of a shift cipher?
* Brute Force * Statistical Attack
32
What is the brute force approach to breaking a shift cipher?
Sequentially trying each key until a readable decrypted message is found.
33
What does the statistical attack exploit in a shift cipher?
The frequency of characters in the plaintext language to infer the decryption key.
34
What is the Index of Coincidence (IoC)?
The probability that two randomly selected characters in a text string are equal.
35
How is the IoC for the English language calculated?
By squaring the probabilities of each letter and summing the squares.
36
What is the approximate IoC value for English?
0.065.
37
What is the significance of calculating the IoC in cryptanalysis?
It helps identify the key used to generate a given ciphertext.
38
What is the first step in applying IoC in a statistical attack?
Compute the frequency vector q for the ciphertext.
39
What does wrapping around refer to in a shift cipher?
Returning to the start of the alphabet after exceeding the character set limit.
40
Fill in the blank: The sum of the probabilities squared in the IoC calculation for a sufficient large plaintext is represented by _______.
I(p,p) = {displaystylesum_{i=0}^{25}{p_i}^2}
41
True or False: In a shift cipher, each plaintext character can map to multiple ciphertext characters.
False.
42
What is the result of the encryption of plaintext character 'p' with key k?
E(k, p) = (p + k) mod 26.
43
What does the statistical attack on a shift cipher require for each possible key value?
Compute the IoC between the frequency vector p and a shifted version of vector q.
44
What is the result of applying a shift of j positions to the frequency vector q?
It simulates undoing the encryption with the shift cipher.
45
What is the key to be found when the IoC is closest to 0.065?
The value of j that maximizes the computed IoC.
46
What is the formula for the IoC when analyzing the ciphertext?
I_j = I (p,q_{(i + j)}: mod: 26) = {displaystylesum_{i=0}^{25}{p_i} : . :q(i+j)}: mod :20.