Chapter 2 Crypto Basics Flashcards

1
Q

what is cryptology

A

the art and science of making and breaking “secret codes”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cryptography

A

MAKING secret codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cryptanalysis

A

BREAKING secret codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the result of an encryption

A

cipher-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is used to configure a crypto-system

A

a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a symmetric key

A

a cryptosystem that uses the same key to encrypt as to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a public key

A

a cryptosystem that uses a public key to encrypt and a private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is kerckhoffs principle

A

the system is completely known to the attacker, only the key is secret, that is crypto algorithms are not secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why do we make assumptions in kerckhoffs principle

A

experience has shown that secret algorithms are weak when exposed, secret algorithms never remain secret, better to find weaknesses before hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The picture of crypto as a black box is aslo called

A

symmetric key crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in the symmetric key crypto what can trudy see

A

the encrypt, the decrypt, some of the plain text but not the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

for simple substitution the shift is called

A

caesars cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when trying all possibilities it is called

A

exhaustive key search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In general simple substitution key can be any ________ of letters

A

permutation, 26! > 2^88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is secure cryptanalysis

A

cryptosystem is secure if best know attack is to try all keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is insecure cryptanalysis

A

cryptosystem is insecure if any shortcut attack is known

17
Q

what is a one time pad encryption

A

Encryption: Plaintext XOR Key = Ciphertext

18
Q

what is one time pad decryption

A

Decryption: Ciphertext XOR Key = Plaintext

19
Q

what is one time pad

A
probably secure
ciphertext provides no info about plaintext
all plaintexts are equally likely
pad is random
pad only used once
pad is only known to sender and receiver
pad is the key
pad is same size as message
20
Q

what is the real world example of one time pad

21
Q

what is a codebook cipher

A

a book filled with codewords

22
Q

what did code books also use

23
Q

what is a codebook additive

A

book of random numbers

24
Q

what are the steps for additive in code book

A
encrypt message with code book
choose position in additive book
add additives to get cipher text
send ciphertext and additive position
recipient subtracts additives before decrypting
25
what happened in WWI
Zimmerman telegram
26
what happened in WWII
golden age of cryptanalysis
27
what is a symmetric key
same key for encryption and decryption | stream ciphers and block cipher
28
what are the two types of symmetric key
stream ciphers and block ciphers
29
what is a public key
two keys one for encryption (public) and one for decryption (private) And digital signatures nothing comparable in symmetric key crypto
30
what is a hash algorithms
can be viewed as one way crypto