Cryptographic Tools Flashcards
a means to allow two parties, customarily called Alice and Bob, to establish confidential communication over an insecure channel that is subject to eavesdropping.
Encryption
- Also called: single-key encryption
- Historically, the only type of encryption until public-key methods introduced in late 1970s
- Still, universally used for providing confidentiality for transmitted or stored data
- Basic idea: the same key is used by sender and receiver
Symmetric Encription
- plaintext
- encryption algorithm
- secret key
- ciphertext
- decryption algorithm
These are the components of…
Symmetric Encription
even if an opponent knows the algorithm and has the ciphertext, he/she cannot decipher the ciphertext or figure out the key.
Strong encryption algorithm
- Strong encryption algorithm
- Sender and receiver have obtained copies of the same secret key in a
secure manner
These are the requirements for secure use of …
Symmetric Encription
- Attacker knows the algorithm
- Attacker has some knowledge of the general characteristics of the plaintext, or even some plaintext-ciphertext pairs
- Exploits the characteristics of the algorithm to attempt to recover the plaintext or deduce the key that was used
- If key deduced, effect is catastrophic: all past and future messages encrypted with that key are compromised
Cryptanalysis
- Attacker tries all possible keys on some ciphertext until an intelligible translation into plaintext is obtained
- On average, half of all possible keys must be tried to achieve success
Brute-force attack
- processes plaintext input in fixed-size blocks
- a long plaintext message is processed as a series of plaintext blocks
- for each plaintext block, produces a ciphertext block of the same size
- most important algorithms: DES, Triple DES, and AES
Block cipher
Using the same key to encrypt each block in symmetric block ciphers is known as the ___ mode of operation
electronic codebook (ECB)
- processes the input elements continuously
- produces output one element at a time
- uses a key stream generated pseudo-randomly from an input key
- good for streaming data over a communications channel or browser/Web link
Stream cipher
generally runs faster than a block cipher
Stream cipher
___ ciphers are better for file transfer, email, databases
block
assures confidentiality in data exchange
Encryption
___ assures data integrity
• contents have not been altered
• from authentic source
• timely and in correct sequence
Message/data authentication
Message/data ___ can be performed either with or without encryption
authentication
- one authentication technique
- uses a shared secret key and a ___ algorithm
- ___ is appended to message before transmission
- ___ is computed separately by recipient and compared with received ___
Message authentication code (MAC)
Three most important types of block ciphers
DES, Triple DES, and AES
Type of block cypher used to compute MAC
DES