Cryptography Flashcards
Modular Math
Lies behind much of cryptography.
Simply put, Modular Math shows you what remains (the remainder).
Caesar Cipher
A monoalphabetic rotation cipher used by Gaius Julius Caesar.
Transposition Ciphers
Use an encryption algorithm to rearrange letters of a plaintext message, forming the ciphertext message. The decryption algorithm simply reverses the encryption transformation
Substitution Ciphers
Use the encryption algorithm to replace each character or bit of the plaintext message with a different character.
One-Time Pads
An extremely powerful type of substitution cipher. One-Time pads use a different substitution alphabet for each letter of the plaintext message.
Running Key Ciphers
In this cipher, the encryption cipher is as long as the message itself and is often chosen from a common book.
Block Ciphers
Operates on “chunks” or blocks, of message and apply encryption to an entire message block at the same time.
Stream Ciphers
Operates on one character or bit of a message (or data stream) at a time.
Confusion
Occurs when the relationship between the plaintext and the key is so complicated that an attacker cannot merely continue altering the plaintext and and analyzing the resulting ciphertext to determine the key.
Diffusion
Occurs when a change in plaintext results in multiple changes spread throughout the ciphertext.
Data Encryption Standard
64-bit block cipher
56-bit key
Long series of XOR operations
16 rounds
DES Modes
Electronic Codebook Mode Cipher Block Chaining Mode Cipher Feedback Mode Output Feedback Mode Counter Mode