Cryptography Flashcards
When is a message, M, vulnerable in a communication?
M is vulnerable as soon as it leaves the sender’s system.
What is encryption?
The process of encoding a message into ciphertext so that its meaning is hidden
C = E(M)
What is decryption?
The process of decoding a message from ciphertext into its normal plaintext
D(C) == D(E(M)) == M
What is a cryptosystem?
A system in which rules are applied for the encryption and decryption of data.
Often keys, k, are used as a mechanism to adapt the encryption function’s output.
What is a cryptanalyst?
Break encryptions, their aim is to find both the plaintext and the decryption algorithm
Why do cryptanalysts want to know the decryption algorithm?
So that later messages can be decoded.
How are encrypted messages decoded?
Using the known decryption function
Noting common frequencies of letters and letter pairs
Exploiting vulnerabilities in encryption algorithms
Using compute power to brute force the encryption.
What cyphers use character manipulation to encode data?
Caesar Cipher One Time Pad (OTP) Vernam Cipher Book Cipher Vigenerè Tableau
What do substitution ciphers do?
Replace characters with other characters in the alphabet.
How does a one time pad work?
Uses non-repeating keys written on paper formed into a pad.
EG: Message has 500 chars, the sender requires 50 chars on a page so 10 pages would be used.
For the English alphabet the encryption is mod 26.
What is a Vernam Cipher and how does it work?
One time pad that uses a random sequence of numbers instead of characters
Take letter index in the alphabet and add the number, mod 26.
What is a book cipher?
A book cipher is used by the sender a receiver to encode texts. Both parties must know the book and a page apriori
Message encoded/decoded using the page in the text.
What is a Vigenerè Tableau and how does it work?
Matrix of letters used to help the encryption/decryption of messages.
Take row and column letter to give a resultant letter.
It provides resistance to frequency analysis as it uses two different characters for each letter, from different texts.
If one key is known it is easier to break.
What is columnar transposition?
Columnar transposition takes n columns and rearranges a message to diffuse the message.
What is columnar transposition susceptible to?
Frequency analysis can be used letters stay in the word, so common digrams can be found to find the column offset.
Can use moving window analysis to find these digrams.
What is symmetric encryption?
Key used is the same for both the encryption and decryption of data.
The key must remain secret at all times?
P = D(K, E(K, P))