Chap 1 and 2 Flashcards
Cryptanalysis
Technique of decoding messages from a non-
readable format back to readable format
without knowing how they were initially
converted from readable format to non-
readable format
Minimum bit size for Symmetric and Asymmetric Encryption
256 and 2048 bits
Cryptography
Art of achieving security by encoding a message from a readable format to non-readable format
Order of hardest to easiest attack
Known Cipher text
Known plaintext
Chosen plaintext
Chosen ciphertext
Chosen text
Confusion vs Diffusion
Confusion - protect relationship between ciphertext and key
Diffusion - protect relationship between ciphertext and plaintext
Confidentiality
Assurance that only authorized parties or intended recipients have access to certain info
Authentication
Assures the identity of all communicating parties and identify sender and receiver of the message.
Integrity
Assures that message has not been modified by unauthorized parties
Availability
Assures that user authentication systems are always available
Non-repudiation
Assures the non-deniability of communications
Access control
Defines who can access what
Access control matrix
Access control list
Active attacks
Modification of original message or send false message
Modification - Replay attack, alteration
Denial of service - DDOS
Fabrication - attack on authentication
Problems with symmetric key encryption
- How can we distribute the keys securely
- Many keys need to be used
- Key management
How to prevent DFH MITM attack
Both parties must mutually authenticate with one another before exchanging information