Chap_3_part-1 Flashcards
what is Cryptography?
the use of mathematical operations to protect messages traveling between parties or stored on a computer
Cipher?
specific mathematical process used in encryption and decryption.
key?
random string of ones and zeros (bits)
cryptanalysis?
a person that analyses encryption and cracks it. Brute-force key cracking: using a dictionary to try all possible keys is one way.
confidentiality means?
ppl who intercept messages can not read them.
what is cipher text?
messages (plain-text) that has been encrypted into seemingly 1’s and 0’s to traverse the network to destination.
what is Substitution Cipher/ how does it work?
one character (plain text) is substituted for another but remains in the same letter position. so: now = + key= rwl
what is Transposition Cipher/ how does it work?
letters (real world = bits) are moved around in plain text message but they are not substituted like they are in Substitution Ciphers. (a grid system is used from the key to create and select each letter and the order they are put into).
difference between Ciphers and Codes?
Ciphers move position of plain text around or use substitution with numbers to encrypt the message. both sides have a key.
Codes: use Code Symbols that represent complete words/ phrases. code books are needed, no need for computer. several codes can be used to represent one word. codes can be broken from reception of messages but ciphers can not because a key is needed, the message intercepted is a random bit.
Symmetric Key Encryption?
a single key is used for encryption and decryption in both directions. (small computation power needed.
key length- each additional bit adds how much time to take to crack the key (password)?
each bit doubles the time needed. mathematical formula is… 2 to the (x) exponent. x =’s the number of bits/letters in the key/password. example: 2 to the 8th exponent = 256 possible keys. usually it can be guessed correctly in the 1st half of keys tried so. 2 to the 8th divided by 2 = 128 tries to break key on average.
what length in key characters is = to a ‘strong’ symmetric key?
100 bits or longer
what is block encryption with DES (Data Encryption Standard)?
64 bits of plain text are encrypted at a time. weaker encryption and uses a 56 bit key with 8 redundant bits.
what is Security through Obscurity?
the concept that a not well understood private symmetric key encryption program is more secure because it is less known. this is not good practice because the software used to create the cipher may not be good and if cracked/ back door is found would be a big security breach.
Cryptographic system?
a set of cryptographic countermeasures for protecting dialogues. aka: all communications between computers are encrypted and a handshake is performed before info is sent. often used by military and businesses .