Cryptography Flashcards

1
Q

Plaintext –

A

the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphertext –

A

the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic system –

A

Specific method of encryption and decryption (also called a cipher or cryptosystem)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transposition –

A

rearranging elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Substitution –

A

replacing elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Code –

A

Words are substituted for other words.

Encryption is NOT the same as a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block Cipher

A

Operate on blocks of plaintext and ciphertext – usually 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream Ciphers

A

Convert plaintext to ciphertext 1 bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric –

A

Same key is used for both encryption and decryption (also called private key encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES -

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDEA –

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

S-Boxes

A

Integral part of DES algorithm

Selects which 32 bits to use after the key and 32-bit data block have been shifted and combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Skipjack

A

Uses 80-bit keys
Used in Clipper chip
- Meant to help FBI combat criminals using encryption
- Built in back door for law enforcement
Government has “master key”
- Key escrow – session key held for later release to law enforcement when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Problems with Symmetric Methods

A

Same key is used to encrypt and decrypt
Shared key is more likely to be compromised
Possible to brute force short keys
Certain keys are weak
Different keys can produce identical ciphertext
Distribution of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Diffie-Hellman Method

A

Each party creates their own private key
Each party computes a public key using a mathematical function of the private key
Public keys are exchanged
Message key is computed from other person’s public key and your own private key
If the math is right, the message key is the same on both sides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SET

A

Secure Electronic Transactions
The SET™ Specification, is an open technical standard for the commerce industry developed by Visa and MasterCard as a way to facilitate secure payment card transactions over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Digital Certificates

A

Used to encode and verify messages
Requires a Certificate Authority that creates a digital certificate based on a private key and other authentication information

19
Q

X.509

A

A popular standard for defining digital certificates

20
Q

VPN

A

Virtual Private Network

21
Q

Key Escrow and Key Recovery

A

Keys held in “reserve” in case the original keys are lost or damaged
Usually split between two parties, each with half of the key
Often requires two or more people to access and recover key

22
Q

Differential Cryptanalysis

A

Look for differences in pairs of messages

Only works on certain ciphers

23
Q

Linear Cryptanalysis

A

Looks for simple approximation of encryption function

24
Q

Differential Power Analysis

A

Measures power consumption of hardware encryption devices

25
Q

Covert Channels –

A

“communication paths that were neither designed nor intended to transfer information at all.”

26
Q

Anonymity –

A

“finding ways to hide the metacontent of messages (i.e. the sender and the recipients of a message).”

27
Q

Steganography –

A

concerned with hiding the existence or presence of a message.

28
Q

Watermarks –

A

used to indicate ownership

29
Q

Unobtrusive communications –

A

Important on the modern battlefield.

Detection of a signal may lead quickly to the sender being attacked.

30
Q

Tamper proofing –

A

Information hidden may be a signed “summary” or a hash value which can be used to detect unauthorized modifications.

31
Q

Data augmentation –

A

Information can be added for the benefit of the public (e.g. details about the work, annotations, purchasing info, …)

32
Q

Substitution systems –

A

substitute redundant parts of a cover with a secret message.

33
Q

Transform domain techniques –

A

Embed secret information in a transform space of the signal (e.g., in the frequency domain).

34
Q

Spread spectrum techniques –

A

adopting ideas from spread spectrum communication

35
Q

Statistical methods –

A

Encode info by changing several statistical properties of a cover and use hypothesis testing in the extraction process

36
Q

Distortion techniques –

A

Store information by signal distortion and measure the deviation from the original cover in the decoding step.

37
Q

Cover generation methods –

A

Encode information in the way a cover for secret communication is created.

38
Q

Stego-only attack:

A

only the stego-object is available for analysis

39
Q

Known cover attack:

A

the original cover-object and stego-object are both available.

40
Q

Known message attack:

A

the hidden message and the stego-object are available.

41
Q

Chosen stego attack:

A

The stego tool (algorithm) and stego-object are known.

42
Q

Chosen message attack:

A

goal is to determine the specific stego tool or algorithm

43
Q

Known stego attack:

A

the tool (algorithm) is known and both the original and steg-objects are available.