CH 3 Flashcards

1
Q

Define Cryptosystem.

A

it is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cryptosystem is also referred to as a ….. .

A

cipher system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the basic components of a Cryptosystem ?

A
  • Plaintext
  • Encryption Algorithm
  • Ciphertext
  • Decryption Algorithm
  • Encryption Key
  • Decryption Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Plaintext.

A

It is the data to be protected during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Encryption Algorithm.

A

It is a mathematical process that produces a
ciphertext for any given plaintext and encryption key. It is a cryptographic algorithm that takes plaintext and an encryption key as input and produces a ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Ciphertext.

A

It is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key. The ciphertext is not guarded. It flows on public channel. It can be intercepted or compromised by anyone who has access to the communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Decryption Algorithm.

A

It is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. It is a cryptographic algorithm that takes a ciphertext and a decryption key as input, and outputs a plaintext. The decryption algorithm essentially reverses the encryption algorithm and is thus closely related to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Encryption Key.

A

It is a value that is known to the sender. The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Decryption Key.

A

It is a value that is known to the receiver. The decryption key is related to the encryption key, but is not always identical to it. The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For a given cryptosystem, a collection of all possible decryption keys is called a ….. .

A

Key space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ….. is an unauthorized entity who attempts to

determine the plaintext.

A

Interceptor (an attacker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An interceptor can see the ciphertext and may know the decryption algorithm. He, however, must never know the ….. .

A

Decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 types of cryptosystems based on the manner in which encryption-decryption is carried out in the system ?

A
  • Symmetric Key Encryption

- Asymmetric Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The encryption process where same keys are used for encrypting and decrypting the information is known as ….. .

A

Symmetric Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric cryptosystems are also sometimes referred to as ….. .

A

secret key

cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A few well-known examples of symmetric key encryption methods are:

A
  • Digital Encryption Standard (DES)
  • Triple-DES (3DES)
  • IDEA
  • BLOWFISH.
17
Q

What are The salient features of cryptosystem based on symmetric key encryption ?

A
  • Persons using symmetric key encryption must share a common key prior to exchange of information.
  • Keys are recommended to be changed regularly to prevent any attack on the system.
  • A robust mechanism needs to exist to exchange the key between the communicating parties.
  • As keys are required to be changed regularly, this mechanism becomes expensive and cumbersome.
  • In a group of n people, to enable two-party
    communication between any two persons, the number of keys required for group is n × (n – 1)/2 .
  • Length of Key (number of bits) in this encryption is smaller and hence, process of encryption-decryption is faster than asymmetric key encryption.
  • Processing power of computer system required to run symmetric algorithm is less.
18
Q

What are the two restrictive challenges of employing symmetric key cryptography ?

A
  • Key establishment: Before any communication, both the sender and the receiver need to agree on a secret symmetric key.
  • Trust Issue: Since the sender and the receiver use the same symmetric key, there is an implicit requirement that the sender and the receiver ‘trust’ each other.
19
Q

What is Asymmetric Key Encryption ?

A

The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption. Though the keys are different, they are mathematically related and hence, retrieving the plaintext by decrypting ciphertext is feasible.

20
Q

What are The salient features of Asymmetric Key Encryption ?

A
  • Every user in this system needs to have a pair of dissimilar keys, private key and public key. These keys are mathematically related – when one key is used for encryption, the other can decrypt the ciphertext back to the original plaintext.
  • Length of Keys (number of bits) in this encryption is large and hence, the process of encryption-decryption is slower than symmetric key encryption.
  • Processing power of computer system required to run asymmetric algorithm is higher.
21
Q

What are the challenges of the Public Key Cryptosystem ?

A
  • The user needs to trust that the public key that he is using in communications with a person really is the public key of that person and has not been spoofed by a malicious third party. This is usually accomplished through a Public Key Infrastructure (PKI) consisting a
    trusted third party. The most common method of making the verified public keys available is to embed them in a certificate which is digitally signed by the trusted third party.
22
Q

What is the relation between the encryption key and decryption key in symmetric cryptosystems ?

A

In this case they are the same and they are symmetric.

23
Q

What is the relation between the encryption key and decryption key in public key cryptosystems ?

A

in this case they are different , but mathematically

related. the encryption key is public while the decryption key is private.

24
Q

Due to the advantages and disadvantage of both the systems, ….. are often used in the practical information
security systems.

A

both symmetric key and public key cryptosystems.