Cryptography Flashcards
Cryptography
Practice if hiding the meaning of information; encryption is used to hide message’s meaning
Encryption
Changing information using an algorithm or cipher into s form that is unreadable by others unless they have the key
Cipher
An algorithm that can perform encryption or decryption
Algorithm
Well defined instructions that describe computations from their initial state to their final state. If-then statements are examples of computer algorithms
Key
Essential piece of info that determines the output of a cipher
You can’t decrypt without a key! Just like you can’t unlock a door without a key
Private key
Only known to a specific user/users who keep it a secret
Be careful with these if the key is lost, data is lost unless there is a recovery agent
Public
Known to all parties involved in encrypted transactions within a given group
Example: encrypted smart card for authentication
Symmetric key algorithm
A class of cipher that uses a single key, identical keys or closely related keys for both encryption and description.
Stream cipher - type of algorithm that encrypts each binary digit one bit at a time
Block cipher - encrypts groups of bits collectively as units aka blocks
Faster than asymmetric so it’s preferred when sending large amounts of data
Examples of symmetric key algorithms: DES, 3DES, RC, AES
Also Kerberos
Asymmetric key algorithm
Uses a pair of different keys to encrypt and decrypt data. The keys are related mathematically
One key used to encrypt one to decrypt
Examples of asymmetric key algorithms: RSA, Diffie-Hellman and elliptic curve cryptography.
SSL and TLS use asymmetric keys but do so in a public key environment
Public key cryptography
Uses asymmetric keys alone or in addition to symmetric keys.
Operates by creating s secret private key and a published public key. The PUBLIC key is well known and ANYONE can use it to encrypt but
ONLY the owner can decrypt (PRIVATE) . If the private key is compromised the system loses its effectiveness
Digital signature
Authenticates a document through math ensuring the file hasn’t been tampered with (integrity) and the it was sent by the actual sender (non repudiation )
Certificate
Electronic document that uses digital signature to bind they key with the identity
CIA triad
Confidentiality
Integrity
Availability
DES
3DES
Symmetric
64 bit block cipher used by the USgvt in the 70s. 64 bit cipher isn’t strong enough and 56bit key can be brute forced.
3DES is similar but uses the cipher algorithm 3 times. Cipher block size is still 64 but the key is 3 times that which is pretty effective against brute force
AES
Advanced Encryption Standard adopted in 2002 by the usgvt.
Symmetric
Composed of 3 different versions of block ciphers AES-128, AES-192 and AES-256
Each has a 128 bit block cipher The different numbers (128,192,256) refer to the different key sizes
Based on substitution-permutation. It takes plain text and applies a specified number of rounds to create the cipher text. Either 10,12 or 14 rounds depending on which version of AES is used (128 is 10 rounds , 192 is 12 rounds, etc)
AES is fast, runs on numerous platforms and uses minimal resources