1. Intro to Crypto Flashcards
Contains 1.1 - 1.3 Lecture content
What is the main purpose of applying cryptography to secure systems?
To protect data from unauthorized access and ensure confidentiality, integrity, and authenticity
This includes using various cryptographic algorithms and principles.
What are the two main types of encryption?
Symmetric and Asymmetric encryption
Symmetric uses a single key, while Asymmetric uses a pair of public and private keys.
Define symmetric encryption.
An encryption method where the sender and receiver share the same secret key for data encryption and decryption.
What is a ciphertext?
The encrypted message that is not human-readable.
What are the two types of symmetric encryption algorithms?
- Stream Ciphers
- Block Ciphers
What is a stream cipher?
Encrypts data bit-by-bit or byte-by-byte in a continuous stream.
What is a block cipher?
Encrypts each block of data independently using the same key.
Define asymmetric encryption.
An encryption method that uses two different keys (public and private) for encrypting and decrypting messages.
What is the key difference between symmetric and asymmetric encryption?
Symmetric uses a single key, while asymmetric uses a pair of keys (public for encryption, private for decryption).
List the fundamental features (primitives) of cryptography.
- Confidentiality
- Integrity
- Authentication
What does confidentiality in cryptography ensure?
Keeps information secret from adversaries; achieved through encryption techniques.
What is cryptanalysis?
The study of breaching cryptographic security systems to gain access to encrypted messages.
Differentiate between cryptanalysis and brute-force attacks.
- Cryptanalysis: Analytical approach exploiting weaknesses in encryption.
- Brute-force: Systematic approach testing every possible key combination.
What is the objective of a brute-force attack?
To output a human-readable plaintext that identifies the underlying secret key.
What is the processing complexity of a brute-force attack for a 15 character password containing letters and digits?
2^90
Explanation:
- Step 1: determine Character set size
- Uppercase letters: 26 characters
- Lowercase letters: 26 characters
- Digits: 10 characters
- Step 2: Calculate the total combinations
- For a password of length L, the total combinations are:
- 62^L
- Here, L=15 , so the total combinations are: 62^{15}
- For a password of length L, the total combinations are:
- Step 3: Approximate using Log
- Use log base 2
- log2 (62) = log10 (62) / log10 (2) = 5.95
- 62^15 = (2^5.95) ^ 15 = (2 ^ 5.95 * 15) = 2 ^ 89.25 =⇒ 2^90
Name the four types of cryptanalytic attacks based on information known.
- Ciphertext-only
- Known-plaintext
- Chosen-Plaintext
- Chosen-ciphertext
What is the key assumption of Kerckhoffs’s principle?
The key must be kept secret, even if everything about the algorithm is public knowledge.
What is unconditional security in cryptography?
A cryptographic algorithm is unconditionally secure if the ciphertext lacks information to uniquely determine the corresponding plaintext.
What is computational security?
Ciphertext/algorithm is difficult to decrypt using current or future resources, but not theoretically impossible.
What are the three complexities to consider when analyzing attack feasibility?
- Processing Complexity
- Data Complexity
- Storage Complexity
What does processing complexity measure?
The time needed to perform the attack.
What does data complexity refer to?
The amount of data needed as input to the attack.
What is storage complexity?
The amount of memory needed to execute the attack.
What is a shift cipher?
A method that replaces each character of the plaintext with a corresponding character of the ciphertext using a key.