CH 2 Flashcards
….. is the cornerstone of computer
and communications security.
Modern cryptography.
Its foundation is based on various concepts of mathematics such as:
- number theory,
- computational-complexity theory,
- probability theory.
How does Classic cryptography manipulate ?
Classic Cryptography manipulates traditional characters.
How does Modern cryptography manipulate ?
Modern Cryptography operates on binary bit sequences.
What is Classic cryptography based on ?
Classic Cryptography is mainly based on ‘security through obscurity’. the techniques employed for coding were kept secret and only the parties involved in communication knew about them.
What is Modern cryptography based on ?
- Modern Cryptography relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secret key which is used as the seed for the algorithms. The computational difficulty of algorithms and absence of secret key makes it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding.
What does Classic cryptography require ?
It requires the entire cryptosystem for communicating confidentially.
What does Modern cryptography require ?
it requires parties interested in secure communication to possess the secret key only.
Cryptology consists of 2 important thing ….. and ….. .
Cryptography, Cryptoanalysis.
What is cryptography ?
it is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services.
We can look at cryptography as a large toolkit containing ….. .
Different techniques in security applications.
What is Cryptanalysis?
It is the art and science of breaking the cipher text. It involves the study of cryptographic mechanism with the intention to break them.
Cryptanalysis is also used during the design of the new cryptographic techniques to ….. .
Test their security strengths.
….. is concerned with the design of cryptosystems while ….. studies the breaking of the cryptosystems.
Cryptography, Cryptoanalysis.
What are the 4 primary objects of Cryptography ?
- Confidentiality
- Data Integrity
- Authentication
- Non-repudiation