Cryptography Flashcards

1
Q

Caesar Cipher

A

The Caesar Cipher is a substitution cipher where each letter in the plaintext is shifted by a fixed number of positions down or up the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example how Ceaser Cipher works

A

With a shift of 3, ‘A’ becomes ‘D’, ‘B’ becomes ‘E’, and so on. ‘X’ becomes ‘A’, ‘Y’ becomes ‘B’, and ‘Z’ becomes ‘C’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption

A

Asymmetric encryption uses a pair of keys: a public key and a private key.
Data encrypted with the public key can only be decrypted with the corresponding private key, and vice versa.
For instance, when a patient uploads medical records, the system can encrypt the data using the patient’s public key, ensuring only they can decrypt it with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric Encryption

A

Symmetric encryption uses a single shared key for both encryption and decryption.
Both sender and receiver share the same secret key.
For instance, patient records stored in a database can be encrypted using a secret key, ensuring confidentiality and protection against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTPS

A

HTTPS is a secure extension of HTTP used for transferring data over the internet.
It employs SSL/TLS protocols to encrypt data transmitted between a client and server.
For instance, when a healthcare provider accesses patient records via a web browser, HTTPS encrypts the data transmission, protecting patient privacy and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cracking a Shift Cipher

A

Brute Force Attack:
Test all possible shift values until the correct plaintext is obtained.
Example: Trying shifts from 1 to 25 and analyzing resulting plaintext for meaningful words or patterns.

Frequency Analysis:
Analyze the frequency distribution of letters in the ciphertext to guess the shift value.
Example: Identifying the most frequent letter in the ciphertext and assuming it corresponds to ‘E’ in the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vigenère Cipher Encryption

A
  1. Repeat the key until it matches the length of the message.
  2. Convert message and key to numeric representations.
  3. Add message values to key values modulo 26.
  4. Convert resulting values back to alphabetic representation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vigenère Cipher Decryption

A
  1. Repeat the key until it matches the length of the encrypted message.
  2. Convert encrypted message and key to numeric representations.
  3. Subtract encrypted message values by key values modulo 26.
  4. Convert resulting values back to alphabetic representation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of encryption to encrypt the passwords prior to storage

A

Symmetric encryption is preferred for encrypting passwords prior to storage due to its efficiency, performance, and simplified key management, provided that proper security measures are in place for managing encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Caesar Cipher vs. Kid-RSA

A

Encryption Method:
Caesar Cipher: Substitution cipher.
Kid-RSA: Asymmetric encryption.

Security:
Caesar Cipher: Low security, easily breakable.
Kid-RSA: High security, relies on computational complexity.

Key Generation:
Caesar Cipher: Fixed shift value.
Kid-RSA: Key pair generated - public and private keys.

Key Management:
Caesar Cipher: Simple, single key.
Kid-RSA: Requires secure management of public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why does Kid-RSA win over Caesar Cipher

A

Security Strength:
Kid-RSA: Offers higher security due to computational complexity.
Caesar Cipher: Low security, easily breakable.

Key Management:
Kid-RSA: Requires robust key management for key pairs.
Caesar Cipher: Simple key management with fixed shift value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private Key vs. Public Key

A

Private Key: Decrypts, signs, secret.
Public Key: Encrypts, verifies, shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication with Private and Public Keys

A

Authentication is achieved without the need for shared secrets or passwords, providing a robust mechanism for secure communications.

Private Key: Secretly generated by each user, Used to create a digital signature for messages/documents.

Public Key: Corresponding key freely distributed, Not involved in signature creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly