Chapter 8: Cryptography Flashcards
Cryptography
practice of storing and transmitting info in a form only authorized parties understand
plaintext
form of a readable message
ciphertext
encrypted form of a message
Cryptographic algorithms
mathematical rules to dictate functions of enciphering and deciphering
Cryptanalysis
name collectively given to techniques aimed to weaken or defeat cryptography
Nonrepudiation
service that ensures the sender cannot later falsely deny sending a message
keyspace
the range of possible keys
Larger keyspace or full use of the keyspace
allows more-random keys to be created which provides more protection
Two basic types of encryption mechanisms used in symmetric ciphers
substitution and transposition
Substitution cipher
change a character (or bit) out for another
Transposition cipher
scramble the characters (or bits)
polyalphabetic cipher
uses more than one alphabet to defeat frequency analysis
key
random string of bits inserted into an encryption algorithm; the result determines what encryption functions will be carried out on a message and in what order
Using the same key for encryption and decryption
symmetric key algorithms
Using different keys for encryption and decryption
asymmetric key algorithms
Challenges with symmetric key encryption
secure key distribution; scalability
Benefits of symmetric key algorithms
perform much faster than asymmetric key algorithms
Symmetric key algorithms provide confidentiality
but do not provide authentication or nonrepudiation
Examples of symmetric key algorithms
AES and ChaCha20
Asymmetric algorithms typical use
to encrypt keys
Symmetric algorithms typical use
to encrypt bulk data
Asymmetric key algorithms provide
authentication and nonrepudiation
Disadvantages of asymmetric key algorithms
much slower than symmetric key algorithms
Examples of asymmetric key algorithms
RSA, ECC, and DSA
Two main types of symmetric algorithms
Stream ciphers; Block ciphers
Stream ciphers
use a keystream generator and encrypt a message one bit at a time
Block cipher
divides the message into groups of bits and encrypts them
Algorithms are publicly known. the secret part of the process is the …
key provides the necessary randomization to encryption
RSA
asymmetric algorithm developed by Rivest, Shamir, and Adleman; the de facto standard for digital signatures