Cryptography Basics Flashcards
Cryptography or cryptology
is the practice and study of techniques for secure
communication in the presence of third parties called adversaries. More generally,
cryptography is about constructing and analyzing protocols that prevent third
parties or the public from reading private messages; various aspects
in information security such as data confidentiality, data integrity, authentication,
and non-repudiation, are central to modern cryptography.
Corey Says:
The transformation of data into a format that is unreadable or unusable
one except the intended target.
Encoding
Not a cryptography topic by default
Encoding is simply the transformation of data
om one format to another.
o Different categories of cryptography fall into
different forms of encoding data with the goal
hide information.
Steganography
Hiding a message in plain sight.
The plain text acts as the Cipher Text
Hi, Elaines Looking Playful!
Hi, Elaines Looking Playful!
Encryption
Hiding a message using the power of Math.
Used for communication between parties where secrecy
is of the utmost importance.
The hidden message, cipher, should be able to be shown
to anyone without revealing the actual encryption.
Encryption is a reversible process
Encryption
- plaintext
- scheme
- ciphertext
Types of Encryption
- Symmetric Encryption: Both Parties have
a copy of the same Icey- Asymmetric (Public) Key Encryption:
There is one key for locking the safe and
one key for opening it.
- Asymmetric (Public) Key Encryption:
Hashing
o Hiding a message using the power of Math.
o Used for storage or verification of data
o Finding a particular hash should tell you nothing
about the original data.
o Hashing is an irreversible process
GOOD HASH KEY FUNCTION
Should be slow
Ultimately, this will hurt would-be attackers more than it will hurt you.
Should have a low collision frequency
Fewest possible duplicates. Or else two inputs could be indistinguishable.
Plaintext
—An unencrypted message (in the clear)
Ciphertext
An encrypted message
Cipher
The algorithm used to encrypt and/or decrypt
Cryptanalysis
—The art of cracking encryption
—Researchers are constantly trying to find weaknesses in ciphers
• A mathematically flawed cipher is bad for everyone
Cryptographic keys
• Keys —Add the key to the cypher to encrypt — Larger keys are generally more secure • Some encryption methods use one key —Some use more than one key —Every method is a bit different
Confusion
• Encryption is based on confusion and diffusion —You need both • Confusion —The encrypted data is drastically different than the plaintext —The process should be non-linear, with no discernible patterns
Diffusion
• Change one character of the input, and many characters change of the output