Chapter 7 - Crypto Flashcards
Monoalphabetic vs polyalphabetic
Mono - one alphabet
Poly - many alphabets
Substitution cypher
Replacing a letter for each letter with a predetermined one
Cipher
Algorithm or key
Scytale cipher
A piece of paper wrapped around a staff that could only be viewable on the correct size staff
Project lucifer
The original IBM project that NSA used to make DES
Cryptanalysis
Analyzing an encryption trying to figure out the key
Crypto system
A system that creates a crypto
Cryptovariable
The key
Key space
This is how large the key is in bits
Kerchiefs principle
Algorithm of a crypto system should always be known, only the key should be secret, others believe it should all be secret.
What gives a cryptosystem strength?
Algorithm Key length Secrecy Initialization Interoperability
Work factor
The length of time it will take to discover a message by brute force
Crypto offers what benefits?
Confidentiality Integrity Authentication Authorization Nonrepudiation - cannot deny it came from the sender
Encipher
Making data unreadable
Vernam cipher - one time pad
DUO could be an example of this..
Exclusive-OR (XOR) - if different than 1 if same than 0
Message - 1001
Key - 1100 (same length as message)
Ciphertext - 0100
Only useful one time to not develop patterns
Rules of crypto as I see it
Key - keep it secret, keep it safe
Random - computers are NOT random
Cipher - the word “the” is your enemy
Running key cipher
Physically analyzing data like the letter in a book with coordinates
Running to piece to piece to get the answer
Concealed cipher
Every third word is part of the message
Steganography
Hiding messages within other media .. Ex. Inside the Theodore jpg image
Security through obscurity.. Yikes
Least significant bit - LSB
These are the bits in the medium that do not affect the output, a perfect place to hide a message
Digital watermarking / DRM
Uses stenography to embed a logo or company specific information in the data using the LSB
Microdot
A micro photo put inside the wax of a stamp
Caesar cipher
Substitution cipher, a=z
Transposition cipher
Word grouping and scrambling based on a key
How do algorithms work within a cipher?
They are substitution and transposition methods randomized into several different sequence functions
Many algorithms to choose from, the key chooses the algorithms to use per message
Frequency analysis
E is the most common letter, the most common 8bit sequence therefor equals E
The comes next and so forth so on
KDF - key derivation function
This is the master key that creates all other subkeys
N(N-1)/2
Formula for # symmetrical keys needed
Out of band method
Using a completely separate media to transfer the key
Symmetrical key
Shared secret key
Pros:
Fast!
Hard to break
Confidentiality
Cons:
Requires secure delivery of key
Each pair needs unique key
No authenticity or nonrepudiation
Examples of symmetric algorithms
DES 3DES Blowfish IDEA RC4,5,6 AES
Asymmetrical key
PKI - private / public keys
Private to public is open message format as anyone can open the message
Public to private is secure message format because only the intended person can open it
What are the pros and cons of asymmetrical algorithms?
Pros:
Better key distribution
Better scalability
Can provide authentication and nonrepudiation
Cons:
Slow. . .
Examples algorithms for asymetrical keys
RSA DH ECC El Gamal Merkle-Hellman Knapsack
Block ciphers
A chunk of data is encrypted at a time in a block (s-box) of 32/64/128
Confusion vs diffusion
Substitution vs transposition respectively
Avalanche effect
One bit change can cause all the cipher text to change or as close as possible
Stream cipher
XOR based encryption but by bit using a keystream generator
Initialization vector
Randomness within the algorithm, cause a pattern in the plaintext to not cause a pattern in the cryptotext
Strong stream cipher characteristics
Long periods of no pattern repeat
Statistically unpredictable
Key stream is unrelated to key
Same number of 0’s and 1’s
Stream vs block
Stream is fast and less secure
Block is slower but more secure
Compression
Compression will cause redundancy to be reduced
Expansion
Expanding the plaintext to the key size
Padding
Adding material to make it more difficult to know what is legitimate message
Key mixing
This is just a subkey
Block ciphers
A chunk of data is encrypted at a time in a block (s-box) of 32/64/128
Confusion vs diffusion
Substitution vs transposition respectively
Avalanche effect
One bit change can cause all the cipher text to change or as close as possible
Stream cipher
XOR based encryption but by bit using a keystream generator
Initialization vector
Randomness within the algorithm, cause a pattern in the plaintext to not cause a pattern in the cryptotext
Strong stream cipher characteristics
Long periods of no pattern repeat
Statistically unpredictable
Key stream is unrelated to key
Same number of 0’s and 1’s
Stream vs block
Stream is fast and less secure
Block is slower but more secure
Compression
Compression will cause redundancy to be reduced
Expansion
Expanding the plaintext to the key size
Padding
Adding material to make it more difficult to know what is legitimate message
Key mixing
This is just a subkey