Crypto - 1. Historical Principles Flashcards

1
Q

What is the purpose of cryptography?

A

Cryptography ensures the confidentiality and integrity of messages or transmission channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define encryption and decryption in cryptography.

A

Encryption is transforming plaintext to ciphertext, while decryption is reversing ciphertext to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between symmetric and asymmetric cryptography?

A

Symmetric cryptography uses the same key for encryption and decryption; asymmetric cryptography uses a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: In symmetric cryptography, the same key is used for both ______ and ______.

A

Encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary function of authentication in cryptography?

A

Authentication appends a tag to a message for verification to ensure its origin or integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Shift Cipher?

A

A cipher that shifts each letter in the plaintext by a fixed number of positions, such as the Caesar cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain mono-alphabetic substitution.

A

Mono-alphabetic substitution replaces each letter uniquely, and is vulnerable to frequency analysis as ciphertext letter frequencies match plaintext frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Vigenère cipher work?

A

A Vigenère cipher uses a keyword to shift each letter in the plaintext by different amounts, making it a poly-alphabetic substitution cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What was the Enigma machine used for?

A

The Enigma machine was a complex cipher device used in WWII for secure communication, famously decrypted by Alan Turing’s team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ‘perfect secrecy’ in cryptography?

A

Perfect secrecy means that ciphertext reveals nothing about plaintext, even if an adversary has unlimited computational power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why does perfect secrecy require long keys?

A

For perfect secrecy, the entropy of the key must be at least as high as the entropy of the plaintext, meaning the key must be as long as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the One-Time Pad (OTP) and its key requirement?

A

The OTP is a cipher that provides perfect secrecy with a key as long as the message, which must never be reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between the One-Time Pad and Vigenère cipher?

A

The OTP requires a key as long as the plaintext and is perfectly secure, while the Vigenère cipher is shorter-keyed and relatively easy to break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does computational security assume about attackers?

A

Computational security assumes that attackers have limited computing power and time, allowing only a small chance of breaking the encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define security strength in cryptography.

A

Security strength measures how hard it is for an adversary to break encryption, often quantified in bits (e.g., 128-bit security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: The principle that ‘only the key should be secret’ is known as ______.

A

Kerckhoffs’ Principle.

17
Q

What is Kerckhoffs’ Principle?

A

A principle stating that a cryptographic system should remain secure even if everything about the system, except the key, is public knowledge.

18
Q

What is a ciphertext-only attack?

A

An attack where the adversary has access only to ciphertexts and no information about the plaintext or key.

19
Q

What is an IND-CPA secure scheme?

A

A scheme is IND-CPA secure if it withstands chosen plaintext attacks where an adversary has access to chosen plaintexts and corresponding ciphertexts.

20
Q

What is semantic security?

A

Semantic security ensures an adversary cannot gain useful information about the plaintext from the ciphertext alone.

21
Q

How does a randomized encryption scheme enhance security?

A

Randomized encryption ensures that identical plaintexts produce different ciphertexts, improving semantic security.

22
Q

What is a nonce in cryptography?

A

A nonce is a unique, single-use value used in encryption to prevent repeated ciphertexts for the same plaintext.

23
Q

What is IND-CCA security?

A

A cryptographic scheme is IND-CCA secure if it resists chosen plaintext and ciphertext attacks, making it stronger against adversarial queries.

24
Q

Define existential unforgeability under chosen message attacks (EU-CMA).

A

A property of authentication schemes where an adversary cannot produce a valid message-tag pair that has not been previously queried.

25
Q

What is the purpose of authentication in cryptography?

A

Authentication verifies message integrity and origin, ensuring that a message has not been altered and is from the legitimate sender.

26
Q

Fill in the blank: The principle of ensuring the origin and integrity of a message is known as ______.

A

Authentication.

27
Q

What type of attack is ‘random tag guessing’?

A

A universal forgery attack where an adversary attempts to guess valid message-tag pairs without prior knowledge.

28
Q

What are implementation attacks in cryptography?

A

Attacks exploiting flaws in cryptographic implementations, such as coding errors or side-channel attacks.

29
Q

What are human attacks in cryptography?

A

Attacks targeting user behavior, such as poor key management or social engineering, rather than the cryptographic system itself.

30
Q

Explain the concept of computational complexity in breaking cryptographic systems.

A

Computational complexity refers to the required time and resources for an attacker to break encryption, often estimated based on known hardware capabilities.

31
Q

Describe the difference between online and offline complexity in cryptographic attacks.

A

Online complexity refers to data required from active interactions, while offline complexity refers to computational time needed without real-time data.

32
Q

Fill in the blank: An encryption scheme’s ______ strength measures how hard it is for attackers to break it.

A

Security.

33
Q

Why is semantic security important in encryption schemes?

A

Semantic security prevents adversaries from deducing information about the plaintext from observing the ciphertext, crucial for data confidentiality.