Chapter 2 Crypto Basics Flashcards

1
Q

what is cryptology

A

the art and science of making and breaking “secret codes”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cryptography

A

MAKING secret codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cryptanalysis

A

BREAKING secret codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the result of an encryption

A

cipher-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is used to configure a crypto-system

A

a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a symmetric key

A

a cryptosystem that uses the same key to encrypt as to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a public key

A

a cryptosystem that uses a public key to encrypt and a private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is kerckhoffs principle

A

the system is completely known to the attacker, only the key is secret, that is crypto algorithms are not secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why do we make assumptions in kerckhoffs principle

A

experience has shown that secret algorithms are weak when exposed, secret algorithms never remain secret, better to find weaknesses before hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The picture of crypto as a black box is aslo called

A

symmetric key crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in the symmetric key crypto what can trudy see

A

the encrypt, the decrypt, some of the plain text but not the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

for simple substitution the shift is called

A

caesars cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when trying all possibilities it is called

A

exhaustive key search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In general simple substitution key can be any ________ of letters

A

permutation, 26! > 2^88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is secure cryptanalysis

A

cryptosystem is secure if best know attack is to try all keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is insecure cryptanalysis

A

cryptosystem is insecure if any shortcut attack is known

17
Q

what is a one time pad encryption

A

Encryption: Plaintext XOR Key = Ciphertext

18
Q

what is one time pad decryption

A

Decryption: Ciphertext XOR Key = Plaintext

19
Q

what is one time pad

A
probably secure
ciphertext provides no info about plaintext
all plaintexts are equally likely
pad is random
pad only used once
pad is only known to sender and receiver
pad is the key
pad is same size as message
20
Q

what is the real world example of one time pad

A

VENONA

21
Q

what is a codebook cipher

A

a book filled with codewords

22
Q

what did code books also use

A

additives

23
Q

what is a codebook additive

A

book of random numbers

24
Q

what are the steps for additive in code book

A
encrypt message with code book
choose position in additive book
add additives to get cipher text
send ciphertext and additive position
recipient subtracts additives before decrypting
25
Q

what happened in WWI

A

Zimmerman telegram

26
Q

what happened in WWII

A

golden age of cryptanalysis

27
Q

what is a symmetric key

A

same key for encryption and decryption

stream ciphers and block cipher

28
Q

what are the two types of symmetric key

A

stream ciphers and block ciphers

29
Q

what is a public key

A

two keys one for encryption (public) and one for decryption (private)

And digital signatures nothing comparable in symmetric key crypto

30
Q

what is a hash algorithms

A

can be viewed as one way crypto