Chapter 12 - Cryptography Flashcards
Cryptography
Science or study of protecting information whether in transit or at rest.
Cryptanalysis
Study and methods used to crack cipher text
Linear Cryptanalysis
Works best on block ciphers
Differential Cryptanalysis
Applies to symmetric key algorithms. Compares differences in the inputs to how each one affects the outcome.
Integral Cryptanalysis
Input vs Output comparison same as differential; however, runs multiple computations of the same block size input.
Nonrepudiation
Means by which a recipient can ensure the identity of the sender and neither party can deny sending
What are the 2 general forms of cryptography?
Substitution - bits are replaced by other bits. Transposition - Doesn’t
Stream Cipher
Readable bits are encrypted one at a time in a continuous sream. Usually done by an XOR operation.
Block Cipher
Data bits are split up into blocks and fed into the cipher
XOR
Exclusive OR; If inputs are the same (0,0 or 1,1), function returns 0; if inputs are not the same (0,1 or 1,0), function returns 1 . Key chosen for cipher must have a length larger than the data; if not, it is vulnerable to frequency attacks.
Symmetric Encryption
Known as a single key or shared key. One key is used to encrypt and decrypt the data. Suitable for LARGE amounts of data. Problems are key distribution and management
Algorithm - DES
Symmetric Encryption - Block cipher; 56 bit key; quickly outdated and now considered not very secure.
Algorithm - 3DES
Symmetric Encryption - Block cipher; 168 bit key; more effective than DES but much slower.
Algorithm - AES
Symmetric Encryption - Advanced Encryption Standard - Block cipher; 128, 192, or 256 bit key; repalces DES; much faster than DES and 3DES
Algorithm - IDEA
Symmetric Encryption - International Data Encryption Algorithm - block cipher; 128 bit key; originally used in PGP 2.0
Algorithm - Twofish
Symmetric Encryption - Block cipher; up to 256 bit key.
Algorithm - Blowfish
Symetric Encryption - Fast block cipher; replaced by AES; 64 bit block size; 32 to 448 bit key: considered public domain.
Algorithm - RC (Rivest Cipher)
Symmetric Encryption - RC2 to RC6; block cipher; comparable key length up to 2040 bits; RC6 (latest) uses 128 bit blocks and 4 bit working registers; RC5 uses varaible block sizes and 2 bit working registers. RC4 is stream cipher.
Asymmetric Encryption
Uses two types of keys for encryption and decryption ( public and private key)
Public vs Private key
Public key generally used for encryption; can be sent to anyone. Private keys are kept secret; used for decryption