Chapter 6 Cryptography and Symmetric Key Algorithms Flashcards
What is key space?
Every algorithm has one. It is the range of values that are valid for use as a key for a specific algorithm. Defined by the bit size, which is the number of binary bits in the key.
What is Kerchoff’s principle?
A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
What is cryptography, cryptoanalysis, and cryptology?
Cryptography is the art of creating and implementing secret codes and ciphers.
Cryptoanalysis is he study of methods to defeat codes and ciphers.
Cryptology is cryptography and cryptanalysis together.
What is a noonce?
A random number that acts as a placeholder in math functions. When the function is executed, the nonce is replaced with a random number. Must be a unique number each time. This is used in the initialization vector, a random bit string that is the same length as the block size.
What is Zero Knowledge proof?
Prove your knowledge of a fact to a third party without revealing the fact itself.
What is split knowledge?
Information necessary to perform an operation is divided. Key escrow–might need multiple agents to be able to pull a key out of escrow.
What is the work function?
Usually represents the time and effort necessary to conduct a brute force attack against an encryption system.
What is M of N?
Minimum number of agents out of total number of agents required to perform a task.
What are codes vs ciphers?
Codes are cryptographic systems of symbols that represent words or phrases. Example of 10-4 representing “I received your communication and understand it.” Can be secret but does not have to be.
Ciphers are always meant to hide the true meaning of the message. They convert from plaintext to cipher text on a bit, character, or block basis.
What are transposition ciphers?
Rearrange the letters of a plaintext message.
What are substitution ciphers?
Replace each character or bit of the plaintext message with a different character.
What is the Caesar cipher?
Shifted each letter of the alphabet three letters to the right. Aka ROT3.
What are the requirements of a one-time pad?
Must be randomly generated.
Must be physically protected against disclosure
Must be used only once.
The key must be at least as long as the message to be encrypted.
What is a running key cipher?
AKA a book cipher. The encryption key is as long as the message itself and chosen from a book, newspaper, etc. Advantage is you don’t have to exchange one-time pads.
What is the difference between confusion and diffusion?
Confusion occurs when the relationship between the plaintext and the key is so complicated that an attacker can’t continue altering the plaintext and analyzing the results to determine the key.
Diffusion occurs when a change in the plaintext results in multiple changes in the cipher text. Example: first do substitution and then do transposition. The substitution introduces confusion and the transposition adds diffusion.