Cryptography Flashcards

1
Q

Define Cryptograhpy

A

Cryptography is the (art and) science of keeping information secure This is usually done by encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptanalysis?

A

Cryptanalysis is the (art and) science of breaking a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptology?

A

Cryptology is the branch of math needed for cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which 4 areas of IS can Cryptography help with?

A

Confidentiality: only authorized persons are allowed to decode a message Authentication: receiver of a message (e.g. a password) should be able to ascertain its origin Integrity: receiver of a message should be able to verify that it hasn’t been modified Non-repudiation: a sender shouldn’t be able to falsely deny that they sent a message -We’re talking about messages here, but the principles can be applied to any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is plaintext?

A

The original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is encryption?

A

Disguising the content of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ciphertext?

A

the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Decryption?

A

Turning ciphertext back into plaintext is called decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cryptographic algorithm?

A

the mathematical function used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a restricted algorithm?

A

If security is based on keeping the algorithm secret, then it’s a restricted algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are restricted algorithms a bad idea?

A

Every time a user leaves a group, the algorithm has to be changed A group must develop their own algorithm; if they don’t have the expertise, then it will be subpar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a cryptographic key?

A

taken from a large range of possible values, the keyspace used as additional input for the en-/decryption function to do the en-/decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the benifit of having the security based in the key, not in the details of the algorithm?

A

The algorithms can be published and analyzed by experts for possible flaws Software for the algorithm can be mass-produced Even if an eavesdropper knows the algorithm, without the key messages cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a cryptosystem?

A

An algorithm together with all possible plaintexts, ciphertexts, and keys is called a cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are symmetic algorithms aka conventional algorithms?

A

that encryption and decryption keys are identical Anyone who has the key can decrypt a message However, before two persons/systems can communicate, they need to agree on a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Asymmetric algorithms aka public-key algorithms?

A

The key used for encrypting messages is the public key The key used for decrypting messages is the private key

17
Q

How do public-key algos work?

A

The public key can be published, so that anyone can encrypt messages to a person/system The private key is only known to the receiver This only works if the private key cannot be calculated from the public key (in any reasonable time)

18
Q

Name 4 important encryption techniques

A

Substitution ciphers Transposition ciphers Stream ciphers Block ciphers

19
Q

What is a substitution cypher?

A

In a substitution cipher each character in the plaintext is substituted for another character

20
Q

What is a Ceasar cypher?

A

One of the earliest techniques to be used in the famous Caesar cipher In the Caesar cipher each character is shifted (by three characters in the original cipher)

21
Q

What is a Multiplicative Inverse?

A

Multiplicative inverse: a multiplicative inverse of x is the number we need to multiply to x to get 1.

22
Q

What is the problem with Monoalphabetic ciphers?

A

Monoalphabetic ciphers are not very secure and can be easily broken by statistical means: Different characters have typical frequencies in languages

23
Q

Homophonic substitution ciphers?

A

Homophonic substitution ciphers try to obscure the frequencies by mapping a character to more than one code For example, “A” could correspond to 5, 13, 25, or 56; while for “B” this could be 7, 19, 32, or 42

24
Q

What is the problem with homophonic substitution ciphers?

A

While this makes analysis a bit harder, it doesn’t hide all statistical properties With the help of a computer can usually be broken in a few seconds

25
What is a polygram substitution cipher?
Instead of encoding single characters, a polygram substitution cipher encrypts groups of letters For example, “ABA” could correspond to “RTQ’, while “ABB” could correspond to “SLL”
26
What is the problem with polygram substitution ciphers?
hides the frequencies of individual letters However, natural languages also show typical frequencies for n-grams (although the curve is flattened)
27
What is a polyalphabetic substitution cipher?
A polyalphabetic substitution cipher uses multiple simple substitution ciphers
28
What is the Vigenère cipher?
Adds a key repeatedly into the plaintext using numerical codes: A=0, B=1, . . . , Z=25 This is done modulo 26, i.e. if the result is greater than 26, then we divide the result by 26 and take the remainder C = M + K mod 26
29
What is the problem wiht the Vigenere cipher?
Code can be broken by analyzing the period Knowing which letters were encoded with the same key allows the application of frequency methods again
30
what is a Rotor Machine?
mechanical encryption devices were these machines implemented a complex Vigenère cipher A rotor is a mechanical wheel wired to perform a general substitution A rotor machine has a keyboard and a series or rotors, where the the output pins of one rotor are connected to the input of another
31
What is a Transposition cipher?
Substitution ciphers on their own are usually not very secure That is why they are combined with transposition ciphers Transposition ciphers on their own are also not very secure In a transposition cipher the symbols of the plaintext remain the same, but their order is changed
32
Explain a Simple Columnar Transposition Cipher
the plaintext is written horizontally onto a piece of graph paper of fixed width while the ciphertext is read off vertically
33
What is the advantage of a Double Columnar Transposition cipher?
A simple columnar transposition can be broken by trying out different width/column lengths Putting the ciphertext through a second transposition enhances security In contrast to a simple substitution cipher, where a second application does not increase security
34
What is the difference between between stream ciphers and block ciphers In symmetric algorithms?
Stream ciphers operate on the plaintext a single bit (or single character) at a time Simple substitution cipher is an example Block ciphers operate on groups of bits (or groups of characters) An example of an early block cipher is Playfair
35
What is the avalanche effect?
This means that a slight change in the input (e.g. toggling one bit) has a major impact on the output
36
Name two algorithms based on SP networks.
Data Encryption Standard (DES) Advanced Encryption Standard (AES)
37
How does the Advanced Encryption Standard work?
Each input byte is sent through an S-box Then the rows of the matrix are shifted In a more complicated process the values in each column of the matrix are mixed In a final step the current round key is added This constitutes one round in AES
38
How does the Data Encryption Standard work?
First step is an initial permutation of the plaintext Then there are 16 rounds of identical operations: A block is broken up into a left and a right half In function f, the data is combined with the (current round) key and then run through an SP network After the 16th round, there is a final permutation