Cryptography Flashcards
PAIN
PAIN – Privacy, Authenticity, Integrity, Non-Repudiation
Cryptography
Cryptography: Science of protecting information by encoding it into an unreadable form
Cryptoanalysis
Cryptoanalysis: The science of breaking the secrecy of encryption algorithms.
Cryptology
Cryptology: The study of both cryptography and cryptoanalysis
Ciphertext
Ciphertext: Data that has been encrypted
Plaintext
Plaintext: Data in readable format, also referred to as cleartext
Encipher
Encipher: Act of transforming data into an unreadable format
Decipher
Decipher: Act of transforming data into a readable format
Key
Key: Secret sequence of bits and instructions that governs the act of encryption and decryption. Also called a cryptovariable
cryptovariable
Secret sequence of bits and instructions that governs the act of encryption and decryption.
Key Clustering
Key Clustering: Instance when two different keys generate the same ciphertext from the same plaintext
Key Zeroization
Key Zeroization: The process of properly destroying keys at the end of their useful life
Keyspace
Keyspace: A large set of possible values used to construct keys
Work factor
Work factor: Estimated time, effort, and resources necessary to break a cryptosystem
Nonrepudiation
Nonrepudiation: A principle can not deny an action they have done
Substitution Cipher
Substitution Cipher: Replaces bits, characters or character blocks with different values. An early version of this was the Julius Caesar substitution cipher
Transposition Cipher
Transposition Cipher: Rearranges the bits, characters or character blocks
Frequency Analysis
Frequency Analysis: Looks for patterns in the ciphertext to try and discover the key. Originally based on the concept that certain letters, words and phrases occur more frequently than others in a language
XOR
Exclusively ORed (XOR): An operation in binary mathematics that is applied to two bits. If the bits are the same (both 1s or both 0s) then a “0” bit is generated and if they are different a “1” bit is generated. This process is commonly used in Stream Ciphers.
Block Ciphers
Block Ciphers: Operates on fixed blocks (e.g. 64 bits) of plaintext to produce the corresponding ciphertext. The Key determines what S-boxes (math functions) are used for encryption. Typically implemented in software solutions. Generally stronger that Stream Ciphers. E.g. AES, 3DES, RC5, RC6
Stream Ciphers
Stream Ciphers: Operates in real-time on a continuous stream of data, typically bit-by-bit.
Stream ciphers are faster than block ciphers but not as strong. Typically implemented in hardware solutions. E.g. RC4
Clipper Chip
Clipper Chip: An NSA designed chip that was to be placed in all US made communication devices to support public encryption. The government maintained keys that would allow it to decrypt any messages encrypted with this device. The Clipper Chip was never deployed, due to public push back.
• Used the classified SkipJack algorithm, which had an 80 bit key
• Used Key Escrow to split the government’s key into two pieces that were managed by two different organizations. Law enforcement could obtain both pieces if required. The concept of Key Escrow is often used by businesses to maintain keys for recovery purposes.
Symmetric Key Cryptography
Symmetric Key Cryptography: Both parties will be using the same key for encryption and decryption.
Symmetric Algorithms
Symmetric Algorithms Include:
• Advanced Encryption Standard – AES (Use Rijndael algorithm), most popular
• Data Encryption Standard – DES, 3DES
• International Data Encryption Algorithm – IDEA
• Blowfish
• RC4
Symmetric Key Pros/Cons
Strengths:
• Faster than Asymmetric Algorithms.
• Stronger encryption than Asymmetric Algorithms, for the same sized keys
Weaknesses:
• Scalability/key management. The number of keys required is (n x (n-1))/2 where n is the number of users. For example if you had 10 users it would requires (10 x (10-1))/2 or 45 keys.
• Key distribution
• Can not provide Authentication, Integrity or Nonrepudiation.
Asymmetric Key Cryptography
Asymmetric Key Cryptography: Uses two different keys that are mathematically related. One key is used to encrypt and the other to decrypt information. These two keys are usually referred to as Private (secret key) and Public (shared key)
Asymmetric Key Pros/Cons
Weaknesses:
• Requires longer key lengths
• Much slower than Symmetric systems
Strengths:
• Better key distribution
• Better scalability. Number of keys required is equal to (2 x n), where “n” is the number of users.
• Can provide confidentiality, authentication, integrity and Nonrepudiation.
Asymmetric Key Algorithms
- RSA (most popular)
- Diffie-Hellman
- El Gamal
- Elliptical Curve Cryptosystem (ECC)
Hybrid Key Cryptography
Hybrid Key Cryptography: Combines the strengths of both asymmetric and symmetric systems. It uses Symmetric keys to encrypt the bulk of the data and uses Asymmetric keys to distribute the symmetric keys.
DES
Data Encryption Standard – DES:
o Key type = Symmetric, Block (with Stream)
o Key length = 56 bit
o Process = 16 rounds of transposition and substitution