12 Cryptography Flashcards

1
Q

What is a encryption?

A
  • measure to secure messages like e-mail, SMS against unauthorized reading
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the caesar method?

1.
2.
3.

A
  • shift cipher (alphabet is shifter by a given number of characters)
  • method: simple shift
  • key: 2 (shifts to the right)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Vignere method?

A
  • vignere cipher
  • a word is choosen as the key, e.g. ONE
  • letters of keyword determine about how any positions a letter of the clear text is shifted
  • O=14, N=13, E=4 (A=0, B=1, …)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the enigma?

A
  • very complex encryption machine
  • used in WW2
  • a decryption machine called Turing-Bomb was built up in a unit in the UK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the enigma machine work?

A
  • numberphile = YTHMYIURFGW
  • letters can turn up twice
  • each time you get completely different code
  • initial position of rotors and plugboard is the important component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Kerckhoff´s Principle?

A
  • the security of an encryption must depend on the secrecy of the key
  • it must not depend on the used encryption method

“Even when the attacker knows which cipher is used, he must not be able to decipher the secret text.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does kerckhoff´s principle mean for computer science?

A
  • encryption methods can easily be standartised and be implemented by all involved parties. the secrurity thus depends on the secrecy of the keys!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three different encryption methods?

A
  • caesar
  • vignere
  • enigma machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are modern encryption standarts?

A
  • DES: Data encryption standard, 56 bit key, used in ATMs and in encryption of speech (smartphones), due to moore´s law not really secure anymore
  • AES: advamced encrpytion standard, keys having length of 128 and 256 bit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the symmetric encryption?

A
  • classic approach, sender and receiver use the same key (e.g. vignere, DES, Enigma)
  • clear text sender to clear text receiver
  • common secret key
  • encrypt to decrypt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an asyymetric encryption?

A
  • sender and receiver use different krys
  • one to encrypt and one to decrypt
  • public key of sender
  • vs private key of receiver
  • pair of keys created, public one forwarded to certification agency, private stays with owner
  • someone gets public key by owner from certificatin agency, he can now encrypt his message to owner
  • someone is not(!) able to decrypt thia
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the public key encryption work?

A
  • even if attacker knows oublic key, he is not able to decrypt the message as the privte key is required
  • best knwon method is RSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is special about asymmetric encryption?

A
  • always need a PAIR of keys that belong to each other
  • RSA based on prime factrosisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DES and AES?

A
  • both are encryption methods
    DES: Data Encryption Standard; 56 bit key; not secure anymore due to Moore´s Law
    AES: Advanced Encryption Standard; 128,192,256 bit; more secure and efficient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly