Cryptography Flashcards

1
Q

Define Cryptograhpy

A

Cryptography is the (art and) science of keeping information secure This is usually done by encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptanalysis?

A

Cryptanalysis is the (art and) science of breaking a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptology?

A

Cryptology is the branch of math needed for cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which 4 areas of IS can Cryptography help with?

A

Confidentiality: only authorized persons are allowed to decode a message Authentication: receiver of a message (e.g. a password) should be able to ascertain its origin Integrity: receiver of a message should be able to verify that it hasn’t been modified Non-repudiation: a sender shouldn’t be able to falsely deny that they sent a message -We’re talking about messages here, but the principles can be applied to any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is plaintext?

A

The original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is encryption?

A

Disguising the content of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ciphertext?

A

the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Decryption?

A

Turning ciphertext back into plaintext is called decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cryptographic algorithm?

A

the mathematical function used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a restricted algorithm?

A

If security is based on keeping the algorithm secret, then it’s a restricted algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are restricted algorithms a bad idea?

A

Every time a user leaves a group, the algorithm has to be changed A group must develop their own algorithm; if they don’t have the expertise, then it will be subpar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a cryptographic key?

A

taken from a large range of possible values, the keyspace used as additional input for the en-/decryption function to do the en-/decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the benifit of having the security based in the key, not in the details of the algorithm?

A

The algorithms can be published and analyzed by experts for possible flaws Software for the algorithm can be mass-produced Even if an eavesdropper knows the algorithm, without the key messages cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a cryptosystem?

A

An algorithm together with all possible plaintexts, ciphertexts, and keys is called a cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are symmetic algorithms aka conventional algorithms?

A

that encryption and decryption keys are identical Anyone who has the key can decrypt a message However, before two persons/systems can communicate, they need to agree on a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Asymmetric algorithms aka public-key algorithms?

A

The key used for encrypting messages is the public key The key used for decrypting messages is the private key

17
Q

How do public-key algos work?

A

The public key can be published, so that anyone can encrypt messages to a person/system The private key is only known to the receiver This only works if the private key cannot be calculated from the public key (in any reasonable time)

18
Q

Name 4 important encryption techniques

A

Substitution ciphers Transposition ciphers Stream ciphers Block ciphers

19
Q

What is a substitution cypher?

A

In a substitution cipher each character in the plaintext is substituted for another character

20
Q

What is a Ceasar cypher?

A

One of the earliest techniques to be used in the famous Caesar cipher In the Caesar cipher each character is shifted (by three characters in the original cipher)

21
Q

What is a Multiplicative Inverse?

A

Multiplicative inverse: a multiplicative inverse of x is the number we need to multiply to x to get 1.

22
Q

What is the problem with Monoalphabetic ciphers?

A

Monoalphabetic ciphers are not very secure and can be easily broken by statistical means: Different characters have typical frequencies in languages

23
Q

Homophonic substitution ciphers?

A

Homophonic substitution ciphers try to obscure the frequencies by mapping a character to more than one code For example, “A” could correspond to 5, 13, 25, or 56; while for “B” this could be 7, 19, 32, or 42

24
Q

What is the problem with homophonic substitution ciphers?

A

While this makes analysis a bit harder, it doesn’t hide all statistical properties With the help of a computer can usually be broken in a few seconds

25
Q

What is a polygram substitution cipher?

A

Instead of encoding single characters, a polygram substitution cipher encrypts groups of letters For example, “ABA” could correspond to “RTQ’, while “ABB” could correspond to “SLL”

26
Q

What is the problem with polygram substitution ciphers?

A

hides the frequencies of individual letters However, natural languages also show typical frequencies for n-grams (although the curve is flattened)

27
Q

What is a polyalphabetic substitution cipher?

A

A polyalphabetic substitution cipher uses multiple simple substitution ciphers

28
Q

What is the Vigenère cipher?

A

Adds a key repeatedly into the plaintext using numerical codes: A=0, B=1, . . . , Z=25 This is done modulo 26, i.e. if the result is greater than 26, then we divide the result by 26 and take the remainder C = M + K mod 26

29
Q

What is the problem wiht the Vigenere cipher?

A

Code can be broken by analyzing the period Knowing which letters were encoded with the same key allows the application of frequency methods again

30
Q

what is a Rotor Machine?

A

mechanical encryption devices were these machines implemented a complex Vigenère cipher A rotor is a mechanical wheel wired to perform a general substitution A rotor machine has a keyboard and a series or rotors, where the the output pins of one rotor are connected to the input of another

31
Q

What is a Transposition cipher?

A

Substitution ciphers on their own are usually not very secure That is why they are combined with transposition ciphers Transposition ciphers on their own are also not very secure In a transposition cipher the symbols of the plaintext remain the same, but their order is changed

32
Q

Explain a Simple Columnar Transposition Cipher

A

the plaintext is written horizontally onto a piece of graph paper of fixed width while the ciphertext is read off vertically

33
Q

What is the advantage of a Double Columnar Transposition cipher?

A

A simple columnar transposition can be broken by trying out different width/column lengths Putting the ciphertext through a second transposition enhances security In contrast to a simple substitution cipher, where a second application does not increase security

34
Q

What is the difference between between stream ciphers and block ciphers In symmetric algorithms?

A

Stream ciphers operate on the plaintext a single bit (or single character) at a time Simple substitution cipher is an example Block ciphers operate on groups of bits (or groups of characters) An example of an early block cipher is Playfair

35
Q

What is the avalanche effect?

A

This means that a slight change in the input (e.g. toggling one bit) has a major impact on the output

36
Q

Name two algorithms based on SP networks.

A

Data Encryption Standard (DES) Advanced Encryption Standard (AES)

37
Q

How does the Advanced Encryption Standard work?

A

Each input byte is sent through an S-box Then the rows of the matrix are shifted In a more complicated process the values in each column of the matrix are mixed In a final step the current round key is added This constitutes one round in AES

38
Q

How does the Data Encryption Standard work?

A

First step is an initial permutation of the plaintext Then there are 16 rounds of identical operations: A block is broken up into a left and a right half In function f, the data is combined with the (current round) key and then run through an SP network After the 16th round, there is a final permutation