Cryptography Flashcards
the practice of disguising information in a way that looks random
Cryptography
earliest known and simplest cypher; uses substitution and a decoder ring
Caesar Cipher
breaking encrypted codes
Cryptanalysis
employees the Caesar cipher as one element of the encryption process; requires a key
Vingenere Cipher
Classic cryptography components (two)
Algorithm and key for encryption
encoded and decoded with the same key; The primary way that we encrypt data
symmetric encryption
sending key with encrypted data
in-band
sending key without encrypted data
out-of-band
uses a key pair (public and private)
Asymmetric encryption
defines key properties, communication requirements for the key exchange and the actions taken through encryption and decryption process
Cryptosystem
Which algorithm is a block cipher, has 64-bit block size, 16 rounds, and a key size of 56 bits?
Data Encryption Standard (DES)
Which algorithm has a 64-bit block size and a key size of 32-448 bits?
Blowfish
Which algorithm has a 64-bit block size and a 168 bit key size?
Triple DES
Which algorithm is the U.S. government encryption standard supported by the NIST and has a 128-bit block size and a key size of 128,192,or 256 bits?
Advanced Encryption Standard (AES)
What type of algorithm encrypts one bit at a time?
Streaming cipher
a fixed size input to a cryptographic primitive that is typically required to be random or pseudorandom
Initialization vector
outputs true only when inputs differ (one is true, zero is false)
Exclusive OR (XOR)
each block of plaintext is XORed with the previous cipher text block before being encrypted; each cipher text block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector
Cipher Block Chaining (CRB)
makes a block cipher into self-synchronizing stream cipher. almost identical to CBC performed in reverse
Cipher Feedback (CFB)
makes a block cipher into a synchronous stream cipher; generates keystream blocks, which are XORed with the plaintext blocks to get the cipher text
Output Feedback
generates the next keystream block by encrypting successive values of a “counter.” The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is simplest and most popular.
Counter (CTR)