Cryptanalysis Flashcards

1
Q

Brute Force

A

Trying every possible key to breaking a cipher. For many types of encryption, this is completely impractical because of the amount of time it would take to try every possible key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis

A

Using a method (other than brute force) to derive the key of a cipher. In some cases, cryptographic techniques can be used to test the efficacy of a cryptographic algorithm. Frequently used to test hash algorithms for collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Frequency Analysis

A

The most basic tool for breaking most classical ciphers. Not effective against modern ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kasiski

A

A method of attacking polyalphabetic substitution ciphers. Can be used to deduce the length of the keyword used in the polyalphabetic substitution cipher. Developed in 1863 by Friedrich.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chosen Plaintext Attack

A

A method for cracking modern cryptography. The attacker obtains the ciphertexts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ciphertext-only and related-key Attack

A

A method for cracking modern cryptography. Attacker only has access to a collection of ciphertexts. Much more likely than known plain text, but also more difficult. The attack is completely successful if the corresponding plain texts can be deduced or, even better, the key. The ability to gain any information about the underlying plain text is considered a success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linear Cryptanalysis

A

Based on finding the approximations to the action of a cipher. Commonly used on block ciphers. A known plain text attack that uses a linear approximation to describe the behavior of the block cipher. Given enough pairs of plain text and corresponding ciphertext, bits of information about the key can be obtained. The more pairs of plain text and cipher text the greater chance of success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Differential Cryptanalysis

A

Form of cryptanalysis applicable to symmetric key algorithms. The examination of differences in input and how that affects the resultant difference in output. Originally only worked w/ chosen plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integral Cryptanalysis

A

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptanalysis Resources

A

Regardless of the technique used, there is always three present:
Time - number of primitive operations which must be performed
Memory - Amount of storage required for the attack
Data - the number of plain texts and ciphertexts required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Total Break (Cryptanalysis Success)

A

A cryptanalysis success where the attacker deduces the secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Global Deduction (Cryptanalysis Success)

A

A cryptanalysis success where the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without key learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Instance (Local) Deduction - (Cryptanalysis Success)

A

A cryptanalysis success where the attacker discovers additional plain texts (or ciphertexts) not previously known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Deduction (Cryptanalysis Success)

A

A cryptanalysis success where the attacker gains some Shannon information about plain texts (or ciphertexts) not previously known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distinguishing Algorithm (Cryptanalysis Success)

A

A cryptanalysis success where the attacker can distinguish the cipher from a random permutation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rainbow Tables

A

A password cracker that works with pre-calculated hashes of all passwords available within a character space. Useful against trying to crack hashes. The best way to crack a hash is by finding a match since they are one-way. Used by popular tools like Ophcrack.