Cryptography Flashcards
Plaintext
An unencrypted message
Ciphertexxt
An encrypted message
Symmetric Encryption
Uses one key to encrypt and decrypt
Asymmetric Encryption
Uses separate keys to encrypt/decrypt
Hash Function
One-way encryption using an algorithm and has no key
Permutation
Also called transposition, provides diffusion by rearranging the characters of the plaintext anagram-style.
Substitution
Replacing one character for another - provides “confusion”
Work Factor
How long it will take to break a cryptosystem.
Monoalphabetic and Polyalphabetic Ciphers
Monoalphabetic ciphers use one alphabet. The same substitution is used for each replacement. Polyalphabetic uses multiple alphabets so the same replacement is not repeated each time. Monoalphabetic ciphers are susceptible to frequency analysis.
Vigenere Square Encryption
A polyalphabetic technique
One-time Pad
Substitution cipher uses identical paired pads of random characters - user modular adidition
Stream and Block Ciphers
Used for symmetric encryption. Stream mode encrypts bit by bit. Block mode ciphers encrypt blocks of data each round. e.g. DES uses 56 bits at a time.
Initialization Vectors
Used in soe symmetric ciphers to ensure the first encrypted block of data is random. Ensures that identical plaintexts encrypt to different ciphertexts.
Chaining
Also called, “feedback”. Seeds the previous encrypted block into the next block to be encrypted. Used to avoid patterns in results ciphertexts.
DES
Data Encryption Standard, describes the “Data Encryption Algorithm (DEA)”. U.S Federal standard for symmetric cipher in 1976.
DES Modes (5)
- Electronic Code Book (ECB)
- Cipher Block Chaining (CBC)
- Output Feedback (CFB)
- Output Feedback (OFB)
- Counter Mode (CTR)