3.2 Cryptography Flashcards
Cryptography protects _________ and _____ of data in daily transactions. Where is it used? 3 things -
confidentiality; integrity.
It’s used in cell phones, email, online shopping, etc.
Caesar cipher does what? It’s a classic _________ cipher.
shifts alphabet letters, typically by 3 spaces.
-substitution
What is the difference between a block and a stream cipher?
block encrypts chunks of data at at a time. can render large portions unusable.
stream encrypts bit by bit. better for files of variable lengths, like streaming video where size can change.
ECC is classified as which type of cryptographic algorithm?
single algorithm; fast and efficient - uses less process power and memory, good for cell phones or portables. Uses short keys while maintaining higher strength. Asymmetrical Key Algorithm.
What is the key point of Kerckhoffs’s second principle?
“The system must not require secrecy; even if stolen by the enemy, system should remain secure.” Remains a key tenet of modern crypto algorithms. System should be robust so if people know all of the encrpytion process except for the key, they shouldn’t be able to break.
What is a substitution cipher?
Substitutes each letter in the alphabet with another one.
What are the main differences between symmetric and asymmetric key cryptography?
symmetric uses single key for encryption and decryption. Sender and receiver have the same key. Much more efficient at encrypting large amounts of data than asymmetric.
How does public key cryptography work?
Public key cryptography, or asymmetric cryptography, uses a pair of keys: a public key, which can be shared, and a private key, which must be kept secret.
- Key Generation: Each user creates a public-private key pair.
- Encryption: A sender encrypts a message using the recipient’s public key, ensuring only the recipient can decrypt it with their private key.
- Decryption: The recipient uses their private key to decrypt the message.
- Digital Signatures: A sender can sign a message with their private key, allowing others to verify it with their public key, ensuring authenticity.
- Key Exchange: It facilitates secure key exchange over insecure channels.
The security relies on the difficulty of specific mathematical problems, making it hard for attackers to deduce the private key from the public key.
Explain how 3DES differs from DES.
-DES used back into the 1970
s - have been comprimised.
-3 DES encrypted DES 3 times.= however it consumed a lot of processor power and memory and was replaced by AES.
Try to decrypt this message using the information in this chapter: V qb abg srne pbzchgref. V srne gur ynpx bs gurz. —Vfnnp Nfvzbi.
I do not fear computers. I fear of
How is physical security important when discussing the cryptographic security of data?
Protects security at rest and is a layer of defense. Also in motion as a thumb drive can be stolen and exploited.
Core Features of Cryptography are? 4-
o Confidentiality: Prevents unauthorized disclosure of data
o Integrity: Ensure data isn’t modified
o Authentication: Used to validate sender with digital signatures
o Non-repudiation: Digital signatures also ensure non-repudiation
What is Plain Text
o An unencrypted message
- Cipher Text
o An encrypted message
What is Cipher
o The encryption algorithm used to encrypt & decrypt the message
What is Key?
Determines the output of the cipher algorithm and is needed to encrypt and
decrypt a message
What are some downfalls of symmetric (private key Encrytion)
-The downside of symmetrical encryption is that it makes it hard to initiate communication
the first time. (exchanging them)
- If attacker gets hold of key, they can open any encrypted email you’ve sent. (storing them)
-The SAME Key is used for both encryption and decryption.
What is the Official Encryption standard of the U.S. Federal Government?
AES - Advanced Encryption Standard