Cryptography Flashcards

1
Q

What is a Symmetric algorithms (secret key)?

A

use the same key for both encryption and decryption.

has dificulties distributing keys, and maintaining large number of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Asymmetric algorithms (public Key)?

A

use different keys for encryption and decryption

is an encryption scheme where each person creates a pair of keys

Each person’s key is published freely while the private key is secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are stream ciphers

A

convert one symbol of plaintext directly into a symbol of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are block ciphers

A

encrypt a group of plaintext symbols as one block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of block encryption

A

High diffusion Immunity to tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the differences between singe and multi use keys

A

Key is only used to encrypt one message Key used to encrypt multiple messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you avoid delays with having a large number of keys.

A

Key Distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES uses a block size of? AES allows keys of sizes?

A

AES uses a block of 128-bits. AES allows keys of size 128-bits, 192-bits, and 256-bits, with 10, 12, 14 rounds, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Electronic Code Book (ECB) ?

A

The simplest way of using a block cipher like AES to encrypt (with the same key) each block in the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Cipher Block Chaining (CBC) ?

A

Block encryption modes such as CBC attempt to hide ECB by chaining blocks together in some manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Public Key encryption?

A

public key system is the identification of a one-way function: easily computed, but difficult to invert without additional information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the uses of the public key encryption?

A

Encryption / Decryption Digital signature Session Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Efficiency of Encryption

A

Devising an asymmetric encryption algorithm depends on identifying a one-way function, easy to compute but hard to invert. • Public key systems largely solve the key distribution problem. • Asymmetric algorithms are generally much less efficient than symmetric algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are keyed Ciphers?

A

Encryption and decryption algorithms use a key K . The key can be a series of bits used in a mathematical algorithm (used for E/D) or the knowledge of how to manipulate the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is breakable encryption?

A

An encryption algorithm is called breakable if, given enough time and information, a cryptanalyst can recover the plaintext. Most encryption algorithms are breakable since the analyst can try all keys systematically. Being breakable does not mean that it is feasible to break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a substitution cipher?

A

is one in which each symbol of the plaintext is replaced with another symbol. 1-1 mapping

17
Q

What is a Caesar Cipher?

A

monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed “distance” away in the alphabet

18
Q

What is Polyalphabetic Substitution Cipher?

A

Start with a key string: “monitors to go to the bathroom” and a plaintext to encrypt: “four score and seven years ago.” Align the two texts, possibly removing spaces:

A Vigenere cipher

19
Q

Possible read: Confusion and diffusion

A

Confusion:
o Transforming information in plaintext into cipertext in a key-dependent manner so that an interceptor cannot readily extract it
o Complicating the relationship between the statistics of the ciphertext and the value of the encryption key
Diffusion:
o Spreading the statistics of the plaintext widely over the ciphertext by allowing each plaintext symbol to affect the value of multiple cyphertext symbols (e.g., letting a ciphertext symbol eaulas to average of multiple plaintext symbols so that a plaintext symbol will end up being used in the avergaing operation of multiple ciphertext symbols)
o Complicating the statistical relationship between the plaintext and ciphertext symbols.

20
Q

hash functions what do they do?

A

converts variable-sized text into a small datum, usually a
fixed size integer.

Qualities

it is difficult to construct a text that has a given hash (the one-way property),
it is difficult to modify a given text without changing its hash (Integrity),
it is unlikely that two different messages will have the same hash (the collision-free
property).

21
Q

What is diffusion?

A

Diffusion: if the hash function does not exhibit the avalanche effect to a slight change of input, then it has poor randomization, and thus a cryptanalyst can make
predictions about the input, being given only the output.

22
Q

What is HMAC?

A

Keyed-hash message authentication code: a message authentication code that uses a cryptographic key in conjunction with a hash function
• Runs data and authentication key through hash function twice

23
Q

Diagram for digital signature for messages

A