Cryptography and Society Flashcards

1
Q

Cryptography Definition

A

“Secret writing” (crypto + graphy).
* Secures digital information, systems, and computations from adversarial attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Concepts

A
  • Encryption: Transforming plaintext into ciphertext.
  • Decryption: Reversing ciphertext to plaintext using a key.
  • Kerckhoffs’ Principle:
  • The security of a system should not rely on secrecy of the algorithm, only the key.
  • Key-Space Principle:
  • The key space must be large enough to resist brute-force attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Cryptography

A

Same key for encryption and decryption.

Examples
Stream Cipher:
* Encrypts data bit-by-bit.
* Based on One-Time Pad (OTP) using pseudo-random key streams.
* XOR operation for encryption/decryption.

Block Cipher:
* Encrypts fixed-size data blocks (e.g., AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Cryptography

A

Different keys: Public (encryption) and Private (decryption).

Example: RSA Algorithm (based on modular exponentiation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Notable Ciphers

A
  • Caesar Cipher:
    • Simple substitution cipher shifting letters by 3 places.
  • Mono-Alphabetic Substitution Cipher:
    • Maps plaintext to a substitution alphabet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Signature

A

Provides: Authentication, Integrity, Non-repudation(accountability)

Often paired with hashing for integrity verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Certificate

A

Issued by a Certificate Authority (CA) to verify ownership of public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Potential Threats

A
  • Brute Force:
    * Systematically trying all keys.
  • Differential Cryptanalysis:
    * Exploits relationships between plaintext and ciphertext.
  • Side-Channel Attacks:
    • Observes physical implementation (e.g., timing, power usage).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Future Challenges

A

Quantum Computing:
* Shor’s Algorithm could break RSA by efficiently factoring large numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Heartbleed Bug (Attack on Cryptographic Systems)

A

Exploited OpenSSL’s implementation flaw
* Affected major websites: Yahoo!, Imgur, Stack Overflow, Reddit, etc.
* Impacted systems: Debian, Red Hat Linux, and Android.
* Users were asked to reset passwords due to potential data exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DROWN Attack (Decrypting RSA with Obsolete and Weakened eNcryption):

(Attack on Cryptographic Systems)

A
  • Exploits obsolete SSLv2 protocol.
  • Highlights risks of using outdated cryptographic protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy Tools and Protocols

A
  • Tor (The Onion Router):
    • Protects user privacy and combats censorship.
    • Enables anonymous communication through multiple encryption layers.
  • HTTP and HTTPS:
    • HTTP:
      • Unencrypted protocol, vulnerable to interception.
    • HTTPS:
      • Adds encryption for secure communication.
      • Not immune to implementation flaws.
    • Combination: Using HTTPS with Tor enhances privacy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access to Strong Encryption Pros

A
  • Empowers individuals against government control.
  • Facilitates secure communication for law-abiding users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access to Strong Encryption Cons

A

Enables malicious actors to operate covertly.
* Difficult to regulate criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretty Good Privacy (PGP)

A

Created by Phil Zimmermann in 1991 for secure email communication.
* Promoted widespread adoption of personal encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zimmerman’s Law

A

Technology trends make surveillance easier.
* Computers’ ability to track doubles every 18 months.

17
Q

Suveillance and End-to-End Encryption

A
  • Edward Snowden’s Revelations:
    • Exposed global surveillance programs (e.g., PRISM, MUSCULAR, Tempora, Stellar Wind).
    • Sparked increased adoption of HTTPS and end-to-end encryption.
  • End-to-End Encryption:
    • Encrypts data on the sender’s device and decrypts only on the recipient’s device.
    • Used in messaging apps (e.g., WhatsApp, Signal).
    • Controversy:
      • Enables privacy but can obscure criminal activities.
    • Debates on banning end-to-end encryption to prevent misuse.