Cryptography Flashcards
What is a Symmetric algorithms (secret key)?
use the same key for both encryption and decryption.
has dificulties distributing keys, and maintaining large number of keys
What is a Asymmetric algorithms (public Key)?
use different keys for encryption and decryption
is an encryption scheme where each person creates a pair of keys
Each person’s key is published freely while the private key is secret.
What are stream ciphers
convert one symbol of plaintext directly into a symbol of ciphertext
What are block ciphers
encrypt a group of plaintext symbols as one block
What are the advantages of block encryption
High diffusion Immunity to tampering
What are the differences between singe and multi use keys
Key is only used to encrypt one message Key used to encrypt multiple messages
How can you avoid delays with having a large number of keys.
Key Distribution Center (KDC)
AES uses a block size of? AES allows keys of sizes?
AES uses a block of 128-bits. AES allows keys of size 128-bits, 192-bits, and 256-bits, with 10, 12, 14 rounds, respectively.
What is Electronic Code Book (ECB) ?
The simplest way of using a block cipher like AES to encrypt (with the same key) each block in the plaintext.
What is Cipher Block Chaining (CBC) ?
Block encryption modes such as CBC attempt to hide ECB by chaining blocks together in some manner
What is Public Key encryption?
public key system is the identification of a one-way function: easily computed, but difficult to invert without additional information.
What are the uses of the public key encryption?
Encryption / Decryption Digital signature Session Key Exchange
Efficiency of Encryption
Devising an asymmetric encryption algorithm depends on identifying a one-way function, easy to compute but hard to invert. • Public key systems largely solve the key distribution problem. • Asymmetric algorithms are generally much less efficient than symmetric algorithms.
What are keyed Ciphers?
Encryption and decryption algorithms use a key K . The key can be a series of bits used in a mathematical algorithm (used for E/D) or the knowledge of how to manipulate the plaintext.
What is breakable encryption?
An encryption algorithm is called breakable if, given enough time and information, a cryptanalyst can recover the plaintext. Most encryption algorithms are breakable since the analyst can try all keys systematically. Being breakable does not mean that it is feasible to break