Cryptography Flashcards
Confidentiality
Only authorized parties can access data.
Integrity
Verifying data has not been altered in transit.
Authentication
Verifying the sender is who they say they are.
Non-Repudiation
Prevents one party from denying actions they carried out.
Cryptography
“Science of secret writing”
Cryptanalysis
Study and practice of finding weaknesses in ciphers
Algorithm
“Formulas to encrypt data”
Cipher
Method used to encode characters to hide their value
Plain Text/Clear Text
Info which is transferred or stored without crypto protection
Cipher text
Result of encryption performed on plaintext using an algorithm.
Substitution Cipher
One character or symbol into another
Substitution Code
Substitution at the level of words or phrases
Transposition
Changing the positions of plaintext letters within a sentence.
eg. meet me at noon = noontaemteem
Exclusive-OR (XOR) Operation
Binary mathematical operation
If values are the same = 0
If values are different = 1
Used in One-Time Pad
One-Time Pad
Considered Unbreakable
3 Requirements:
- Made up of truly random values and used only once
- Must be at least as long as the message
- Securely distributed to destination and protected at sender’s and receiver’s sights.
Cons: More overhead, needs to be received in a secure fashion, sender/receiver must be perfectly synched.
Frequency Analysis
Study of the frequency of letters or groups of letters in a cipher text.
Eg. Wheel of Fortune
Initialization Vectors
Random values used with algorithms to ensure patterns are not created during encryption process.
Not encrypted when being sent
Used in WEP
Steganography
Electronic Watermarking
Hiding one’s message in another in order to prevent it from being detected.
Graphics/Sound Files
ADS
Alternate Data Streams
Adds a program on to another to help it work across multiple platforms.
Can be used for evil.
Eg. Drive in movie with someone in the trunk.
Quantum Cryptography
Message is sent in a series of photons. Receiver must know sequence and polarity of photons to decode message.
If someone intercepts, some of the photons will change polarity and message will be altered.
Hashing
Used for Integrity
One-way encryption function. Takes variable-length input and makes a fixed-length output.
Hash collision happens when different inputs create the same hash value. Collision detection prevents this.
MD5
Message Digest 5
Hash Function (Cisco)
Digest Size: 128 bits
SHA-1
Secure Hashing Algorithm
Hash Function
Digest Size: 160 bits
SHA-2/SHA-224/256
Secure Hashing Algorithm
Hash Function
Digest Sizes: 224, 256 bits