Crypto - 1. Historical Principles Flashcards
What is the purpose of cryptography?
Cryptography ensures the confidentiality and integrity of messages or transmission channels.
Define encryption and decryption in cryptography.
Encryption is transforming plaintext to ciphertext, while decryption is reversing ciphertext to plaintext.
What is the difference between symmetric and asymmetric cryptography?
Symmetric cryptography uses the same key for encryption and decryption; asymmetric cryptography uses a public key for encryption and a private key for decryption.
Fill in the blank: In symmetric cryptography, the same key is used for both ______ and ______.
Encryption and decryption.
What is the primary function of authentication in cryptography?
Authentication appends a tag to a message for verification to ensure its origin or integrity.
What is a Shift Cipher?
A cipher that shifts each letter in the plaintext by a fixed number of positions, such as the Caesar cipher.
Explain mono-alphabetic substitution.
Mono-alphabetic substitution replaces each letter uniquely, and is vulnerable to frequency analysis as ciphertext letter frequencies match plaintext frequencies.
How does a Vigenère cipher work?
A Vigenère cipher uses a keyword to shift each letter in the plaintext by different amounts, making it a poly-alphabetic substitution cipher.
What was the Enigma machine used for?
The Enigma machine was a complex cipher device used in WWII for secure communication, famously decrypted by Alan Turing’s team.
What is ‘perfect secrecy’ in cryptography?
Perfect secrecy means that ciphertext reveals nothing about plaintext, even if an adversary has unlimited computational power.
Why does perfect secrecy require long keys?
For perfect secrecy, the entropy of the key must be at least as high as the entropy of the plaintext, meaning the key must be as long as the message.
What is the One-Time Pad (OTP) and its key requirement?
The OTP is a cipher that provides perfect secrecy with a key as long as the message, which must never be reused.
What is the difference between the One-Time Pad and Vigenère cipher?
The OTP requires a key as long as the plaintext and is perfectly secure, while the Vigenère cipher is shorter-keyed and relatively easy to break.
What does computational security assume about attackers?
Computational security assumes that attackers have limited computing power and time, allowing only a small chance of breaking the encryption.
Define security strength in cryptography.
Security strength measures how hard it is for an adversary to break encryption, often quantified in bits (e.g., 128-bit security).