Cryptography Flashcards

1
Q

FEATURES OF CRYPTOGRAPHY

A

Confidentiality: Only the intended recipient can access the information.
Integrity: Data cannot be altered without detection during storage or transit.
Non-repudiation: The sender cannot deny their intent to send the information.
Authentication: The identities of both the sender and recipient are verified, ensuring the origin and destination of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption

A

Uses the same key to encrypt and decrypt messages (e.g., DES, AES, Blowfish, RC4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption

A

Each party generates a pair of public and private keys. The public key is shared, while the private key is kept secure (e.g., RSA, Elliptic Curve, DSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Substitution

A

Each character in the message is replaced by another character or symbol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transposition

A

Characters in the message are rearranged without changing their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Caesar Cipher

A

A shift of 3 is applied to each letter of the plaintext.
Formula:
C=E(P)=P+3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key-based Cipher

A

Uses a keyword to control encryption by placing the characters of the key at the beginning of the ciphertext, followed by the rest of the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VERNAM CIPHER

A

A transposition cipher where a number is assigned to each letter of the plaintext and key. The characters are combined numerically, then adjusted to fit the alphabet (mod 26).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BLOCK VS STREAM CIPHERS

A

Block Cipher: Encrypts fixed-size blocks of data (e.g., DES, AES), with padding added if data is insufficient.

Stream Cipher: Encrypts data in real time (e.g., VoIP), using substitution techniques for faster encryption (e.g., RC4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CONFUSION VS DIFFUSION

A

Confusion: Complex relationships between ciphertext and key. It makes it hard to find the key even if multiple plaintext-ciphertext pairs are available.

Diffusion: Distributes the plaintext’s statistical structure across the ciphertext. A single change in plaintext results in a drastic change in ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly