Chapter 6 (Domain 2: Asset Security) Flashcards
Caesar cipher
Julius Caesar to communicate with Cicero.
Also known as the ROT3 (or Rotate 3) cipher.
The Caesar cipher is a substitution cipher that is mono-alphabetic
Enigma
German military-industrial complex adapted a commercial code machine nicknamed Enigma
Ultra
The Allied forces began a top-secret effort known by the code name Ultra to attack the Enigma codes.
The Allies, led by Alan Turing, successfully broke the Enigma code in 1940
What are the 4 fundamental goals of cryptographic systems?
- Confidentiality
- Integrity
- Authentication
- Nonrepudiation
Two main types of cryptosystems enforce confidentiality
- Symmetric cryptosystems use a shared secret key available to all users of the cryptosystem.
- Asymmetric cryptosystems use individual combinations of public and private keys for each user of the system.
How is message integrity enforced?
The use of encrypted message digests, known as digital signatures, created upon transmission of a message.
Nonrepudiation
Nonrepudiation provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender. It also prevents the sender from claiming that they never sent the message in the first place
How is nonrepudiation enforced?
- Nonrepudiation is offered only by public key, or asymmetric, cryptosystems
- Secret key, or symmetric key, cryptosystems (such as simple substitution ciphers) do not provide this guarantee of nonrepudiation.
Kerckhoffs’s principle
(Also known as Kerckhoffs’s assumption) is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. The principle can be summed up as “The enemy knows the system.”
Cryptography
The art of creating and implementing secret codes and ciphers is known as cryptography
Cryptanalysis
The study of methods to defeat codes and ciphers
Cryptology
Together, cryptography and cryptanalysis are commonly referred to as cryptology
Boolean: AND
The AND operation (represented by the ∧ symbol) checks to see whether two values are both true
- Only one combination has 2 values are both true: 1 AND 1 is 1
Boolean: OR
The OR operation (represented by the ∨ symbol) checks to see whether at least one of the input values is true
- The only time this is False is when both inputs are false
Boolean: NOT
The NOT operation (represented by the ∼ or ! symbol) simply reverses the value of an input variable.
- Gives the opposite value