Crypto Study 1 Flashcards

1
Q

What function does this stand for ^?

A

The AND operation where both inputs have to be true for a true output value. Only an X and Y of 1 produce and output value of 1.

X=1 and Y=1

X+Y= 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What function does this symbol stand for? v

A

The OR operation. Only one value needs to be TRUE in order to produce a TRUE value.

e.g. 1 +0 = 1 but 0 = 0 = 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What function does this symbol represent? ~

A

The NOT operation. The NOT operation is the opposite of the function so a 1 with the NOT operation applied is 0 and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What function does this symbol represent? ⊕

A

The exclusive OR operation. If one value OR the other is TRUE then the result is TRUE. 1 + 1= 0 but 1 +0=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a NONCE?

A

A random number that acts as a placeholder variable in mathematical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of a NONCE.

A

An IV or initialization vector which is a random bit string that is the same length as the block size and is XORed with the message. They are used to create unique ciphertext everytime the the same message is encrypted using the SAME KEY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SPLIT KNOWLEDGE?

A

When information or privelige is split among different users so no one personn has the ability to compromise the security of an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a TRANSPOSITION CIPHER?

A

Rearrangement of letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a SUBSTITUTION CIPHER?

A

Uses an encryption algorithm to replace the letters of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What other name is a ONE TIME PAD known as?

A

Vernam Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the requirements or rules for keeping a ONE TIME PAD secure?

A
  1. Must be randomly generated.
  2. Must be physically protected against disclosure
  3. Can be used only ONCE
  4. Key must be at least as long as the message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What other name is a RUNNING KEY CIPHER known as?

A

A BOOK CIPHER​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Transpostion CIPHER is also known as a ________________ Cipher.

A

BLOCK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A STREAM CIPHER works on a _____ at a time

A

BIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What causes CONFUSION in Cryptography?

A

When the relationship between the plaintext and the key is so complicated that moving the text around is not enough to decipher it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What causes DIFFUSION in Cryptography?

A

When a change in the plain text causes multiple changes throughout the ciphertext.

17
Q

What are some of the issues with SYMMETRIC KEY Cryptography?

A
  1. Key Distribution is problematic- must have a secure method to EXCHANGE keys
  2. Does not provide non-repudiation
  3. Not SCALABLE
  4. Keys have to be regenerated often- if a person leaves every key must be regenerated
18
Q

How is SYMMETRIC KEY ENCRYPTION accomplished? (How many keys)

A

Each participant has ONE secret key that must be known to both parties. Two keys used.

19
Q

How is ASYMMETRIC KEY encryption accomplished?

A

Using a PUBLIC Key (known to all) and a PRIVATE KEY (Known only to one side).

Person encrypting uses the recipient’s PUBLIC KEY which is decrypted by the PRIVATE KEY of the recipinent.

20
Q

What is the formula to determine the number of SYMMETRIC KEYS required?

A

Number of Keys= n(n-1)/2