Chapter 2 Foundations of Cryptography Flashcards
What is cryptography?
Cryptography is the science of taking data, making it hidden in some way so others can’t see it, and then bringing the data back.
What is the main goal of cryptography?
The main goal of cryptography is to provide confidentiality to information.
What is obfuscation in the context of cryptography?
Obfuscation is the process of taking something that makes sense and hiding it so it does not make sense to the casual observer.
What are the two main techniques used in obfuscation?
Diffusion and confusion.
What is diffusion in cryptography?
Diffusion makes data less visible and less obvious.
What is confusion in cryptography?
Confusion stirs up the data, making it difficult to recognize.
What are encryption and decryption?
Encryption is the process of converting plain text into hidden data, while decryption is the process of converting it back to its original form.
What is the Caesar cipher?
The Caesar cipher is one of the oldest types of cryptography, involving shifting letters by a fixed number of positions.
How does a Caesar cipher work?
A Caesar cipher shifts each letter of the plaintext by a fixed number of positions down the alphabet.
What is ROT5 in a Caesar cipher?
: ROT5 means each letter in the plaintext is shifted by 5 positions down the alphabet.
What is cryptanalysis?
Cryptanalysis is the process of breaking encrypted codes.
What is the Vigenère cipher?
The Vigenère cipher is a method that uses a key to apply multiple Caesar ciphers to plaintext, making it more secure.
How does the Vigenère cipher work?
It uses a key to determine the shift value for each letter in the plaintext, creating a more complex encryption.
What are the two essential components of any encryption algorithm?
An algorithm and a key.
What is exclusive OR (XOR) in binary encryption?
XOR is a binary operation used in some encryption algorithms where each bit of the output is the sum of the corresponding bits in the input, modulo 2.
What is Kerckhoffs’s principle?
Kerckhoffs’s principle states that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Why is it important that encryption algorithms are open standards?
Open standards allow everyone to test and verify the security of the encryption, ensuring it is robust and not easily broken.
What are the three components of the CIA of security?
Confidentiality, Integrity, and Availability.
How is confidentiality typically achieved in security?
Through encryption, using methods like symmetric or asymmetric encryption, and block or stream ciphers.
What does integrity ensure in terms of data security?
Integrity ensures that the data has not been altered between the time it was created and the time it is accessed.
What is a hash function in cryptography?
: A hash function is a mathematical function that takes an input (or message) and returns a fixed-size string of bytes, which appears random.
What is a message digest?
A message digest is the fixed-length output (or hash value) of a hash function, representing the input data.
What happens to a hash value if even a small change is made to the input?
The hash value will be completely different if even a small change is made to the input.