Cryptography Flashcards
What asymmetric algorithm is based on the fact that 2 very large prime numbers can be multiplied easily but can’t be factored easily. Used for digital signatures and key encryption.
RSA
3DES features
Uses 168bit key
Uses 48 rounds of computation
AES features
Uses 128, 192, 256bit keys
Uses 14 rounds of computation
DES features
Based on 128bit lucifer algorithm
Uses 16 rounds of computation
Data origin authentication definition
A system based authentication that verifies the source of a message
Cryptanalysis definition
The process of studying ciphertext and cryptosystems to identify weaknesses
Key clustering definition
The same ciphertext generated from the same plaintext using two different keys
Cipher definition
An algorithm that uses random symbols to represent plaintext units or single letters in the form of ciphertext.
ciphertext definition
encrypted data that is unreadable until it is converted into plaintext.
3 characteristics of quantum cryptography
based on the laws of quantum mechanics
generates a cryptographic key that can be exchanged securely between remote users
combines quantum cryptographics with traditional algorithms to distribute secret keys
What method uses human interaction to obtain encryption keys and valuable information
social engineering
What method uses trial and error attack to try every possible key until it succeeds
brute force
What method examines multiple pieces of ciphertext to determine trends or statistical data
ciphertext only
What method examines power requirements and duration of the encryption process to find the encryption key
differential cryptanalysis
What method searches both plaintext and ciphertext from the same message to find the encryption key
known plaintext
What attack collects hash values in a table to save time in hash function attacks
rainbow table
What attack examines the plaintext and ciphertext for linear approximations
linear cryptanalysis
What attack exploits weak points in block ciphers with highly mathematical structures
algebraic
What attack decrypts ciphertext and examines the plaintext result to find the key
chosen ciphertext
What attack uses the algorithm and encryption device to find the encryption method
chosen plaintext
define ciphertext
data that has been encrypted
define plaintext
original text before encryption
define decipher
act of decrypting ciphertext
define encipher
act of encrypting plaintext
define work factor
estimated time and effort required to overcome a security control and break a cryptosystem
define algorithm
a small procedure used for encryption
define frequency analysis
main method of cryptanalysis and involves analysis of patterns of letters.
define running key cipher
uses real world objects such as book to describe each word by a sequence of numbers.
define substitution cipher
replaces bits, characters, or blocks with different bits, characters, or blocks
define transposition cipher
uses permutation to scramble letters and a key to determine the positions to which the characters are moved.
define concealment cipher
ensures every x word within a text is part of the real message.
define block cipher
applies a cryptographic key and algorithm to a block of data at once rather than one bit at a time.
define stream cipher
applies a cryptographic key and algorithm to one bit at a time in a data stream.
How many channels are used in quantum cryptography?
2
What are the two channels used for in quantum cryptography?
1 channel transmits quantum key material through single photon light pulses
1 channel carriers message traffic
define symmetric key encryption
uses a shared secret key for both encryption and decryption
define asymmetric key encryption
uses two separate keys for encryption and decryption
3 symmetric key strengths
Faster than asymmetric
difficult to break
cheaper than asymmetric
3 symmetric key weaknesses
needs to be secured properly
complex key management
does not provided authentication
3 Symmetric key algorithms
3DES
DES
AES
DES
divides plaintext into blocks of 64bits
16 rounds of transposition
uses 56bit key
uses IBM 128bit lucifer algorithm
3DES
uses 3 56bit keys
encrypts/decrypts data 3 times with the 3 keys
48 rounds in computation
AES
supports key sizes of 128, 192, 256
10, 12, 14 rounds of computation depending on key
Uses 16 rounds of cryptographic functions to work on 64bit data blocks
blowfish
A patent free algorithm that can use 128bit blocks.
uses 64bit and 128bit blocks
SAFER
uses variable key size and is used in the SSL protocol
RC4
A 128bit encryption algorithm that makes use of a
SPN cryptosystem and a pair of subkeys per round
CAST
7 asymmetric algorithms
RSA Digital Signature Algorithm Diffie Hellman Elliptic Curve Cryptography El Gamal Knapsack LUC
RSA key lengths
768, 1024
Digital Signature Algorithm key lengths
512, 1024
DSA algorithm
SHA-1
Where is DSA primarily used?
governments
Is diffie-hellman used for encryption or digital signatures?
no