Cryptography Flashcards
Define Cryptograhpy
Cryptography is the (art and) science of keeping information secure This is usually done by encoding it

What is Cryptanalysis?
Cryptanalysis is the (art and) science of breaking a code
What is Cryptology?
Cryptology is the branch of math needed for cryptography and cryptanalysis
Which 4 areas of IS can Cryptography help with?
Confidentiality: only authorized persons are allowed to decode a message Authentication: receiver of a message (e.g. a password) should be able to ascertain its origin Integrity: receiver of a message should be able to verify that it hasn’t been modified Non-repudiation: a sender shouldn’t be able to falsely deny that they sent a message -We’re talking about messages here, but the principles can be applied to any information
What is plaintext?
The original message
what is encryption?
Disguising the content of a message
What is ciphertext?
the encrypted message
What is Decryption?
Turning ciphertext back into plaintext is called decryption
What is a cryptographic algorithm?
the mathematical function used for encryption and decryption
What is a restricted algorithm?
If security is based on keeping the algorithm secret, then it’s a restricted algorithm
Why are restricted algorithms a bad idea?
Every time a user leaves a group, the algorithm has to be changed A group must develop their own algorithm; if they don’t have the expertise, then it will be subpar
What is a cryptographic key?
taken from a large range of possible values, the keyspace used as additional input for the en-/decryption function to do the en-/decrypting
What is the benifit of having the security based in the key, not in the details of the algorithm?
The algorithms can be published and analyzed by experts for possible flaws Software for the algorithm can be mass-produced Even if an eavesdropper knows the algorithm, without the key messages cannot be read
What is a cryptosystem?
An algorithm together with all possible plaintexts, ciphertexts, and keys is called a cryptosystem
What are symmetic algorithms aka conventional algorithms?
that encryption and decryption keys are identical Anyone who has the key can decrypt a message However, before two persons/systems can communicate, they need to agree on a key
What are Asymmetric algorithms aka public-key algorithms?
The key used for encrypting messages is the public key The key used for decrypting messages is the private key
How do public-key algos work?
The public key can be published, so that anyone can encrypt messages to a person/system The private key is only known to the receiver This only works if the private key cannot be calculated from the public key (in any reasonable time)
Name 4 important encryption techniques
Substitution ciphers Transposition ciphers Stream ciphers Block ciphers
What is a substitution cypher?
In a substitution cipher each character in the plaintext is substituted for another character
What is a Ceasar cypher?
One of the earliest techniques to be used in the famous Caesar cipher In the Caesar cipher each character is shifted (by three characters in the original cipher)
What is a Multiplicative Inverse?
Multiplicative inverse: a multiplicative inverse of x is the number we need to multiply to x to get 1.
What is the problem with Monoalphabetic ciphers?
Monoalphabetic ciphers are not very secure and can be easily broken by statistical means: Different characters have typical frequencies in languages
Homophonic substitution ciphers?
Homophonic substitution ciphers try to obscure the frequencies by mapping a character to more than one code For example, “A” could correspond to 5, 13, 25, or 56; while for “B” this could be 7, 19, 32, or 42
What is the problem with homophonic substitution ciphers?
While this makes analysis a bit harder, it doesn’t hide all statistical properties With the help of a computer can usually be broken in a few seconds
What is a polygram substitution cipher?
Instead of encoding single characters, a polygram substitution cipher encrypts groups of letters For example, “ABA” could correspond to “RTQ’, while “ABB” could correspond to “SLL”
What is the problem with polygram substitution ciphers?
hides the frequencies of individual letters However, natural languages also show typical frequencies for n-grams (although the curve is flattened)
What is a polyalphabetic substitution cipher?
A polyalphabetic substitution cipher uses multiple simple substitution ciphers
What is the Vigenère cipher?
Adds a key repeatedly into the plaintext using numerical codes: A=0, B=1, . . . , Z=25 This is done modulo 26, i.e. if the result is greater than 26, then we divide the result by 26 and take the remainder C = M + K mod 26
What is the problem wiht the Vigenere cipher?
Code can be broken by analyzing the period Knowing which letters were encoded with the same key allows the application of frequency methods again
what is a Rotor Machine?
mechanical encryption devices were these machines implemented a complex Vigenère cipher A rotor is a mechanical wheel wired to perform a general substitution A rotor machine has a keyboard and a series or rotors, where the the output pins of one rotor are connected to the input of another
What is a Transposition cipher?
Substitution ciphers on their own are usually not very secure That is why they are combined with transposition ciphers Transposition ciphers on their own are also not very secure In a transposition cipher the symbols of the plaintext remain the same, but their order is changed
Explain a Simple Columnar Transposition Cipher
the plaintext is written horizontally onto a piece of graph paper of fixed width while the ciphertext is read off vertically
What is the advantage of a Double Columnar Transposition cipher?
A simple columnar transposition can be broken by trying out different width/column lengths Putting the ciphertext through a second transposition enhances security In contrast to a simple substitution cipher, where a second application does not increase security
What is the difference between between stream ciphers and block ciphers In symmetric algorithms?
Stream ciphers operate on the plaintext a single bit (or single character) at a time Simple substitution cipher is an example Block ciphers operate on groups of bits (or groups of characters) An example of an early block cipher is Playfair
What is the avalanche effect?
This means that a slight change in the input (e.g. toggling one bit) has a major impact on the output
Name two algorithms based on SP networks.
Data Encryption Standard (DES) Advanced Encryption Standard (AES)
How does the Advanced Encryption Standard work?
Each input byte is sent through an S-box Then the rows of the matrix are shifted In a more complicated process the values in each column of the matrix are mixed In a final step the current round key is added This constitutes one round in AES

How does the Data Encryption Standard work?
First step is an initial permutation of the plaintext Then there are 16 rounds of identical operations: A block is broken up into a left and a right half In function f, the data is combined with the (current round) key and then run through an SP network After the 16th round, there is a final permutation
