Cryptography Flashcards
Cypher
SYSTEM used to crated an encoded message
Cesar Cypher
message + key = cypher text
key = how many values you want to shift in a message
1 shift is A = B
2 shift is A = C etc
Total possible shift = 26 since thats how many letters are in the our alphabets. Human can crack this in less than an hour.
CIA Triad
Confidentiality
- File Encryption
- Message Encryption
- Link Encryption
Availability
Integrity
- Digital signatures
- Hashes
Symmetric Key Cryptography
- uses same key to encrypt and decrypt
- the key has to be shared prior to sending messages
- strength comes from key size and algorithm used for encryption
e. g.
Stream Cipher
- performs operation on each bit and not the whole steam at once
0101010001000100111
shift every 4th bit
0100010101010101111
Block Cipher
- break message into blocks
- encrypt each block
0101010001000100111
split blocks into 4
0101 0100 0100 0100 111
encrypt each block
0101 0100 0100 0100 111
Cypher Block Chaining Mode (CBC)
0101010001000100111
0101 0100 0100 0100 111
- encrypt first block
- then encrypt the 1st encrypted block + second block togeather
Rounds
- how many times the algorithm cycles through the text
DES
Data Encryption Standard
- uses 64 bit key and 16 rounds of encryption
- it was cracked in 1998 so triple DES was found
Triple DES
- uses 168 bit key and 48 rounds of encryption
- takes three times longer to encrypt and decrypt
AES
Advanced Encryption Standard
- can use 128, 192 or 256 bit encryption key
- used 10, 12 and 14 rounds respective to key length
- AES is faster and secure than DES/3DES
Advantages of Symmetric Key Cryptography
- fast
- difficult to crack
Uses of Symmetric Key Cryptography
- file encryption for transmission (AES 256)
- encryption of files at storage
- financial transactions (3 DES)
- VPN encryption (AES 256)
Drawbacks of Symmetric Key Cryptography
- no method to transmit key to clients
- difficult to manage a lot of keys
- does not provide non-repudiation i.e. confirmation of who sent the message
- it lack digital signatures
Asymmetric Key Cryptography
- each client uses one pair or keys i.e. private key and public key
- Client A - public-key-A and private-key-A
- Client B - public-key-B and private-key-B
Both need to share their public keys
- Client A wants to send message to B
- Client A encrypts the message with B’s public key
- Client A sends the message
- Client B receives the message
- Client B uses his private key to decrypt the message
Man in the Middle Attack
Client A, Client B, Client M
- Client A sends Client B his keys
- M intercepts this key and send his own public key to B
- Same thing happens with A. So A and B each have M’s public key instead of each others
- A wants to send message to B
- A encrypts the message with M’s key and sends it. M intercepts the message and the encrypts it back with Bs public key
- B receives and message and decrypts it with his private key but is not aware that it has been tempered
RSA
- provides authentication and encryption
- used digital signatures for authentication
- allows to exchange keys - it encrypts symmetric keys and transmits them through the public network and only the person with the private key is able to decrypt them
- uses one way encryption function