Cryptography Flashcards

1
Q

What is the law regarding passwords?

A

There’s now a law which makes it an offence to not reveal your password when a law enforcer asks you to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cryptosystem?

Disguises

A

Disguises messages, allowing only selected people to see through the disguise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cyphertext?

Jumbled

A

Where all the information is jumbled up so it can be interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two basic methods for disguising messages?

A
  • Transposition
  • Substitution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is transposition?

A

Letters rearranged into a different order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is substitution?

A

Letters replaced by other letters or symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the method for simple transposition encryption?

A
  • Decide a keyword
  • Write the key horizontally as the heading for columns.
  • Assign numerical values to each letter based on the letter’s order of appearance in the alphabet.
  • Align plaintext message across each column.
  • Read down each column according to the ordinal value (col A1 first followed by col C2 etc).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the method for simple transposition decryption?

A
  • Write the key horizontally as the heading for columns.
  • Assign numerical values to each letter based on the letter’s order of appearance in the alphabet.
  • Place the cyphertext segments under each column.
  • Read across each column to obtain the plaintext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is simple substitution encryption also known as?

A

Caesar cypher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the method for simple substitution encryption?

A

rewatch lecture?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the problem with the shift cypher?

A

The number of keys is too small (26)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an alternative approach to the shift cypher?

Permutation

A

Use a random key permutation for each letter in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is symmetric key cryptography?

A

Same key used to encrypt and decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is symmetric key cryptography?

A

Same key used to encrypt and decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is asymmetric key cryptography?

A
  • The key for encryption is not the same as the key for decryption.
  • Two keys are needed.
  • Send public key to intended recipients.
  • Private key always remains with the sender.
  • Assures that messages are from their advertised source.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hash?

Transformation of data

A

A hash is a transformation of data into a distilled form (message digest) that is unique to the data – the process is not reversible (one-way-hash).

17
Q

What is a cryptographic hash used for?

Integrity

A

A (cryptographic) hash is used to verify the integrity of data – check if it has been altered in any way.

18
Q

What is hashing used for?

Integrity

A
  • Verify the integrity
  • Authenticate that the document is from who it claims to be
19
Q

What is a PPK?

A

Public-private key

20
Q

What is the procedure for digital signing?

Intended recipient, message digest, senders public key

A
  • Arrange for intended recipient to obtain a copy of your public key.
  • Compute message digest for data.
  • Encrypt (PPK) digest using private key and append it to the original message before sending it to the intended recipient.
  • Recipient uses sender’s public key to check that the message has really come from the stated sender and that it hasn’t been altered in any way.
21
Q

How does the recipient confirm the message is authentic?

Senders public key, digest

A
  • The digest is decrypted by the recipient using the sender’s public key.
  • The recipient then computes their own digest of the message and compares this with the decrypted value.
  • If the digests are identical then assume the message is who it claims to be from (authenticate) AND that it hasn’t been altered in transit (validate integrity).
22
Q

What does a digital certificate do?

Public key

A

Verifies that a public key belongs to the owner of the certificate.

23
Q

What is the encryption method for the vigenere cypher?

A
  • Decide a keyword
  • Assign each letter in the keyword a numerical value depending on where they are in the alphabet (A=0, Z=25)
  • Write each value from the keyword under the plaintext
  • Shift the letter by the number of spaces corresponding by the keyword
24
Q

What is the decryption method for the vigenere cypher?

A
  • Assign each letter in the keyword a numerical value depending on where they are in the alphabet (A=0, Z=25)
  • Write each value from the keyword under the plaintext
  • Shift the letter backwards by the number of spaces corresponding by the keyword
25
Q

Cryptosystem

Disguises

A

Disguises messages, allowing only selected people to see through the disguise.

26
Q

Cryptography

Designing

A

Is the science of designing, building, and using cryptosystems.

27
Q

Cryptanalysis

Breaking

A

Is the science of breaking a cryptosystem.

28
Q

Cryptology

Study

A

Is the study of cryptography and cryptanalysis

29
Q

Digital Envelope

A
  • Sender obtains a copy of the receivers public key (from receivers digital certificate)
  • Sender uses receivers public key to encrypt the digitally signed message creating a digital envelope
  • Sealed envelope is sent to receiver via internet or other untrusted communication channel