Classical encryption Flashcards

1
Q

What is cryptography?

A

The study of designing crypto-systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cryptoanalysis?

A

The study of breaking cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is secret writing?

A

Transformation of data using a secret called the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can cryptography provide?

A

Confidentiality: A key is needed in order to read the message

Authentication/ (integrity): A key is needed in order to write the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a cryptosystem consist of?

A

Plaintext
Ciphertext
Keys
Encryption function
Decryption (inverse function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric key cipher (private key cipher)?

A

Enc and Dec keys only known to sender and receiver

The key must be communicated over a secure channel,

single-key

P -> (key) -> C -> (key) -> P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is asymmetric key cipher (public key)?

A

Each participant has private and public key

Used for encryption of messages, and creation of digital signatures

P -> (public key) -> C -> (private key) -> P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does digital signatures work?

A

Message -> Hash

Sign w/private key

Verify with public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is brute force attack (exhaustive key search)?

A

An attack where the adversary tries all keys.

This attack cannot be prevented, so all cryptosystems must have enough keys to make this too difficult computationally.

Prevention of this attack is a minimum standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 types of attacks?

A

Known ciphertext: Know only C

Known plaintext: Know small amount of P, and its equivalent C

Chosen plaintext: Attacker can obtain the C of some chosen P. Has inside encryptor

Chosen ciphertext: Attacker can obtain some P of some chosen C. Has inside decryptor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which attacks should cryptosystems prevent, by the modern standard?

A

Chosen plaintext and chosen ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Kerckhoffs principle?

A

An attacker has complete knowledge of how the cryptosystem works. The key is the only unknown thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is security through obscurity?

A

Systems that tries to be secure by going against Kerckhoffs principle. Meaning they try to stay secure by keeping parts of their cryptosystem hidden, and relying on this to be enough to be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is transposition?

A

The characters in the plaintext are mixed up with each other (permuted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is substitution?

A

Each character (or set of characters) is replaced by a different character (or set of characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does transposition ciphers work?

A

Permutes characters usually in a fixed period d and permutation f

The plaintext can be seen as a matrix of rows of length d

Generally transposition ciphers can permute rows or columns and output in row or column order.

Key: the pair d and f, where f is a certain permutation of the plaintext, and d is the length of the permutation (period ?)

Each block of d characters is re-ordered using the permutation f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Do a cryptanalysis of transposition ciphers

A

Frequency of distribution of chars are the same.

If the period d is small, then the ciphers can be solved by hand using the process of anagramming (restoring disarranged characters to their original position).

we can guess the value of d and write the ciphertext in columns so that there are d columns

Knowledge of plaintext lamguage digrams and trigrams can optimize trials.

This process can be automated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe substitution ciphers

A

Each char is replaced by a char in the Y-alphabet, as defined by a substitution table

Simple ciphers are called monoalphabetic sub. ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between transposition and substitution ciphers?

A

t permute plaintext chars, while s permute alphabet chars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does the Caesar cipher work?

A

Move the ith letter of the alphabet to the (i+j)th letter.

Key: j

Enc: c_i = (ai + j) mod n
Dec ai = (ci - j) mod n

where n is the size of the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Do a cryptanalysis of the Caesar cipher

A

We only need to find where one of the most frequent chars is shifted to.

See what the key becomes when shifting the most common char to the theoretically most common alphabet char. Then use this key to decrypt.

This can be tried until the correct plaintext has been found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the random simple substitution cipher?

A

A cipher that assigns a random char of the alphabet to another char of the alphabet.

Enc and Dec are defined by the substitution table which randomly permutes the alphabet

If alphabet has 26 chars, there are 26! keys

Caesar is a special type of this cipher

Is still vulnerable to statistical methods of cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is polyalphabetic substitution?

A

Use multiple mappings from P to C

Effect: Smooth the frequency distribution, so direct frequency analysis is no longer effective

Typical ciphers are periodic substitution ciphers, based on a period d

24
Q

How does random polyalphabetic substitution cipher work?

A

Key generation: Select block length d, generate d random simple substitution tables

Enc: Encrypt ith char, use sub-table number j where i≡j (mod d)

Dec: Use same sub-table as in enc in order to reverse simple substitution.

25
Q

What is the vignere cipher?

A

Periodic substitution cipher based on shifted alphabets

K is specified by a sequence of characters:

K = k1 k2…k_(d-1)

ki gives the amount of shift in the ith alphabeth, i.e.

Enc(p) = (p + ki) mod n

26
Q

Do a cryptoanalysis of the Vignere cipher

A

Identify period length

Attack seperately using d different substitution tables (alphabets). Since each substitution is just a shift, this is straight forward if there are sufficient ciphertext

27
Q

What is a method that can be used to find the period of the vignere cipher?

A

Autocorrelation
Kasiski method
Index of coincidence

28
Q

What do we need to consider in regards to an adversary who wishes to break a cryptosystem?

A

What resources the adversary has available:
- access to input/output
- computational capability

What the adversary is aiming to achieve
- retrieve the whole key
- distinguishing two messages (i.e. yes or no)

29
Q

How can you identify the Vigenére period using autocorrelation?

A
  1. For a ciphertext C, compute the correlation between C and its shift Ci for all plausible values i of the period
  2. There is a better correlation between two texts with the same size shift than between two texts with different size shifts
  3. We therefore expect to see peaks in the value of Ci when i is a multiple of the period
  4. Plot result in histogram to identify the period
30
Q

How can cryptoanalysis be done on Vigenére.

A

Identify the period length d

Divide the ciphertext into d different texts, and attack these separately using d different alphabets

Only need to find the shift for each alphabet (as in Caesar)

Can use frequency analysis on each text part

31
Q

Describe the Kasiski method of finding the period of a Vigenére cipher

A

See if you can find sequences of repeating characters in the ciphertext

Calculate how many characters these are apart

If there are different distances between the repeating sequences, look for common divisors of the different lengths

32
Q

What is the autokey cipher?

A

Starts off as Vigenére

Once the alphabet defined by the kay have been used once, use the plaintext to define subsequent alphabets

This cipher is not periodic

33
Q

What is the running key cipher?

A

Uses a (practically) infinite set of alphabets from a shared key.

In practice, the shared key can be extracted from a book.

Often called a book cipher

34
Q

What are the two most used symmetric ciphers?

A

AES and DES

35
Q

What are the 2 requirements of conventional encryption?

A

Strong enc algorithm

Sender and receiver must obtain the secret key in a secure fashion, and the key must be kept secure

36
Q

What feature of symmetric encryption makes it feasible for widespread use?

A

Only the key must be kept secret, not the algorithm

37
Q

What is the principal security problem in symmetric encryption?

A

Keeping the key secret

38
Q

What are the 3 dimensions for which cryptographic systems are characterized along?

A

Type of algorithm (substitution, transformation)

Number of keys (symmetric, private/public)

Way of processing plaintext (block, stream)

39
Q

For what problem is cryptoanalysis most difficult?

A

Ciphertext only

40
Q

What is an encryption algorithm designed to withstand?

A

Know-plaintext

41
Q

When is an algorithm unconditionally secure?

A

The ciphertext generated does not contain enough information to determine uniquely corresponding plaintext, no matter how much ciphertext is available. Meaning no matter how much time the attacker has.

42
Q

What algorithm provides unconditional security?

A

One-time pad

43
Q

When is an algorithm said to be computationally secure?

A

Meets one of the requirements:

  1. Cost of breaking exceeds the value of the information
  2. Time it takes to break exceeds the useful lifetime of the information
44
Q

Why is the ceasar cipher easy to break?

A

Only 25 keys need to be tried

The plaintext is recognizable

enc and dec algorithms are known

45
Q

What can cause plaintext to not be easily recognizable?

A

If the input is abbreviated or compressed

46
Q

How many permutations are there of a set of n elements?

A

n!

47
Q

What is a monoalphabetic substitution cipher?

A

Uses a single cipher alphabet, meaning a single mapping from the plaintext alphabet to the ciphertext alphabet is used per message.

48
Q

What are digrams?

A

Two-letter combinations

49
Q

Why are monoalphabetic ciphers easy to break?

A

They reflect the frequency data of the original alphabet

50
Q

What is the strength of the Hill-cipher?

A

It hides single-letter frequencies

3x3 hides digrams

It is string against ciphertext only attacks

51
Q

What types of attack is the Hill cipher weak for?

A

known plaintext attack

Can use matrix equations to calculate the key

52
Q

What are polyalphabetic substitution ciphers?

A

Uses different monoalphabetic substitutions through the plaintext

53
Q

How does the Vigenére cipher hide frequency?

A

There are multiple ciphertext letters for each plaintext letter (depending on what character of the key is used each time).

54
Q

Describe the one-time-pad

A

Uses a random key that is as long as the message

The key is only used to encrypt and decrypt a single message

Discarded after that

Each new message requires a new key of the same length as the message

Unbreakable - produces random output with no frequency preservation

55
Q

What are the problem with the one-time-pad?

A
  1. Practical problem of making a large quantities of random keys
  2. Key distribution and protection