Ciphers Flashcards

1
Q

What is symmetric encryption?

A

Private-key encryption. The same key is used to encrypt and decrypt a message. The key is typically the recipient private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is asymmetric encryption?

A

Public-key encryption. The sender uses the recipients public key to encrypt a message and the recipient uses their private key to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Kirchhoff’s Principle?

A

Security/secrecy only depends on the key and cannot be solved without the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is “Security by Obscurity”?

A

Assuming a system is more secure if a hacker doesn’t know the encryption/decryption protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the encryption method for a Caesar/Shift Cipher?

A

Given a key k and a message m, shift every character of m by k places in the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the decryption method for a Caesar/Shift Cipher?

A

Shift every character by -k places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How strong is the security of a Caesar/Shift Cipher?

A

Very weak. Key space is very small, as a result messages are prone to Brute-force attacks or frequency analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the keys for a Substitution Cipher?

A

All permutations (possible combinations) of the Alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the encryption method for a substitution Cipher?

A

Apply the permutation given by the key to every character of the string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the decryption method for the Substitution Cipher?

A

Apply the inverse permutation to every character of the string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the security of the Substitution Cipher?

A

There are 26! possible keys making a Brute-Force Attack infeasible even with modern software. Still prone to Frequency Analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are keys generated by a One-Time Pad?

A

Uniformly at random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the encryption method for a One-Time Pad?

A

Bitwise addition mod 2 or bitwise XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some properties of initialisation vectors (IV)?

A
  • Uniqueness
  • Non-predictable
  • Random
  • Length Compatible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a known ciphertext attack?

A

Attacker is given a ciphertext and tries to find the corresponding plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a known plaintext attack attack?

A

Attacker is given a list of plaintext-ciphertext pairs and tries to either find the key or at least plaintext for a given ciphertext

17
Q

What is a chosen plaintext attack?

A

Attacker is given an encryption oracle