Cryptography Flashcards

1
Q

When is a message, M, vulnerable in a communication?

A

M is vulnerable as soon as it leaves the sender’s system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

The process of encoding a message into ciphertext so that its meaning is hidden

C = E(M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is decryption?

A

The process of decoding a message from ciphertext into its normal plaintext

D(C) == D(E(M)) == M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cryptosystem?

A

A system in which rules are applied for the encryption and decryption of data.

Often keys, k, are used as a mechanism to adapt the encryption function’s output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a cryptanalyst?

A

Break encryptions, their aim is to find both the plaintext and the decryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do cryptanalysts want to know the decryption algorithm?

A

So that later messages can be decoded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are encrypted messages decoded?

A

Using the known decryption function

Noting common frequencies of letters and letter pairs

Exploiting vulnerabilities in encryption algorithms

Using compute power to brute force the encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What cyphers use character manipulation to encode data?

A
Caesar Cipher
One Time Pad (OTP)
Vernam Cipher
Book Cipher
Vigenerè Tableau
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do substitution ciphers do?

A

Replace characters with other characters in the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a one time pad work?

A

Uses non-repeating keys written on paper formed into a pad.

EG: Message has 500 chars, the sender requires 50 chars on a page so 10 pages would be used.

For the English alphabet the encryption is mod 26.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Vernam Cipher and how does it work?

A

One time pad that uses a random sequence of numbers instead of characters

Take letter index in the alphabet and add the number, mod 26.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a book cipher?

A

A book cipher is used by the sender a receiver to encode texts. Both parties must know the book and a page apriori

Message encoded/decoded using the page in the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Vigenerè Tableau and how does it work?

A

Matrix of letters used to help the encryption/decryption of messages.

Take row and column letter to give a resultant letter.

It provides resistance to frequency analysis as it uses two different characters for each letter, from different texts.

If one key is known it is easier to break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is columnar transposition?

A

Columnar transposition takes n columns and rearranges a message to diffuse the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is columnar transposition susceptible to?

A

Frequency analysis can be used letters stay in the word, so common digrams can be found to find the column offset.

Can use moving window analysis to find these digrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is symmetric encryption?

A

Key used is the same for both the encryption and decryption of data.

The key must remain secret at all times?

P = D(K, E(K, P))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is asymmetric encryption?

A

Keys are complementary pairs in which there is a decryption key that inverts the encryption of the encryption key.

P = D(K_d, E(K_e, P))

18
Q

When does symmetric encryption provide authentication?

A

When the key is kept secret and is only known by the two communicating parties in the conversation.

19
Q

How many keys are needed for an N-user system using symmetric encryption?

A

n(n-1)/2 keys are needed.

20
Q

What is a drawback of symmetric key encrypting?

A

Key exchange is an issue as A needs to get the key to B while keeping the key secret which can’t be guaranteed via transmissions if using symmetric encryption.

21
Q

How do public key encryption work?

A

Public key encryption works as each user has a public and private key. Public keys are published freely and private keys are kept secret.

Information is encrypted using the recipient’s public key, which is then decrypted by the recipient upon receipt using the private key.

22
Q

Does public key encryption scale?

A

Yes as each user is authenticated by their private key and users can send information to one-another using public keys.

23
Q

What were the three conditions of Diffie-Helman’s paper with regards to public key encryption?

A

Computationally easy to encode/decode a message with a key

Computationally infeasible to derive the private key from a plaintext attack

Computationally infeasible to derive the private key from the public key.

24
Q

What is taken advantage of to allow for public/private key systems to work?

A

The prime factorization problem of large prime numbers is used in the public/private key system. This problem is one such that it is computationally infeasible to factorize large primes in a timeframe that makes the data useful.

This property is used to create encryption keys as it means that it is computationally infeasible to find the primes used to create the key.

25
Q

What is RSA?

A

Rivest-Shamar-Adelman encryption is an asymmetric system. Uses modulated coprimes in order to encrypt and decrypt the data. Both primes are needed to be able to decode the messages.

26
Q

How many bits can be used in DES?

A

56 bits

27
Q

How many bits can be used in AES?

A

128, 192 or 256 bits

28
Q

How many bits can be used with RSA?

A

1024 or 4096 bits

29
Q

What is faster, symmetric or asymmetric encryption?

A

Symmetric encryption as the same key is used for encryption and decryption.

30
Q

What is the use case for RSA?

A

Used to share symmetric keys secretly as RSA is slower than symmetric keys but is secure when transmitting over an untrusted network.

31
Q

What is a stream cipher, its benefits, and its drawbacks?

A

Converts one character at a time

Has low error propagation and is fast

Susceptible to injections and modifications, not diffused

32
Q

What is a block cipher, its benefits, and its drawbacks?

A

Groups characters and encrypts them as groups

Highly diffused

Errors are propagated within the block, slow, blocks are padded

33
Q

What is the principle of confusion?

A

Making the ciphertext as unreadable as possible by hiding the relationship between the key and the ciphertext

34
Q

What is the principle of diffusion?

A

Attacker needs a large amount of ciphertext to work out the message as the cipher is spread about the input characters so that the output depends on many parts of the input.

35
Q

How does DES WORK?

A

Uses substitution and transposition repeatedly for 16 cycles on a 56-bit block (64 bits with padding)

36
Q

What is AES and how does it work?

A

Advanced Encryption Standard, uses repeating cycles of transposition & substitution. Each cycle takes 10,12 or 14 bits (depending on the length of encryption) and performs:

Byte substitution
Shift Row
Mix Column
Add Subkey

37
Q

What does the byte substitution step of AES do?

A

Substitutes each byte of a 128-bit block according to a substitution table.

Confusion operation

38
Q

What does the shift row step of AES do?

A

A transposition step. row n is shifted left circular (n-1) bytes for 128 and 192 bits.

256 bits, row 2 is shifted 1 bytes and rows 3 and 4 are shifted 3 and 4 bytes respectively.

Diffusion operation

39
Q

What does the mix column step of AES do?

A

Shifting left and XOR’ing bits with themselves.

40
Q

What does the add subkey step of AES do?

A

A portion of the key is unique to this cycle and is xOR’d with the cycle result.

Confusion operation and incorporates the key into the answer.

41
Q

How does Triple DES work, and how does it improve the security of DES?

A

Triple DES uses three keys, the first key encrypts, the second decrypts and the third encrypt again. by using three keys you can get 112 bits of encryption.

The second key is negligent due to Double DES not providing any security benefit