Cryptography I Flashcards

1
Q

What parts of CIA are ensured by cryptography?

A

Confidentiality and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Kerchoff’s principle?

A

security of an encryption system should not depend on secrecy of system, but on secrecy of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe symmetric encryption

A

The encryption and decryption keys are the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Symmetric Key Distribution mean?

A
  • each pair of communicators needs a distinct key
    => you need a quadratic number of keys for pairwise communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Julius Caesar’s Chiper

A

You shift each letter by 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the Alphabet Shift Cipher

A

You shift each letter by k (generalized Caesar’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Issues with the Alphabet Shift Cipher

A
  • insecure ( you can guess k by trying all values and seeing which makes sense)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the Permutation Cipher

A
  • each letter is replaces by another one (permutation of letters)
  • nb of possible keys: 4 x 10^26
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Issues with Substitution Cipher

A
  • can be cracked by frequency analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe One Time Pad

A
  • key = sequence of random bits, same length as plaintext
  • to encrypt: C = K bitwiseXOR P
  • to decrypt: P = K bitwiseXOR C
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages and disadvantages of One Time Pad?

A

+ each bit of C is random
+ fully secure if k only used once

  • key needs to be as large as plaintext => hard to generate/share
  • key CANNOT be reused
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some One Time Pad pitfalls?

A
  • if you reuse key - you can XOR the Cs and get the XOR of the Ps
  • imperfect randomness: the randomly generated key might end up being 0000 or smth => useless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Characteristics of Cryptographic Hash Functions?

A
  • One-way:
    Given x, hard to find P such that h(P) = x
  • Weak Collision Resistance:
    Given P, hard to find Q such that h(Q) = h(P)
    -String Collision Resistance:
    Hard to find pair of Q and P such that h(Q) = h(P)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does CHF solve file integrity? (how to see that files were not tampered with)

A
  • A computes CH of each file, stores locally
  • A checks CH of retrieved files against what he has stored
    WEAK CR => difficult for B to change file such that hashes are equal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does CHF solve password authentication? (I dont want to store password directly in database)

A
  • store CH of password but not the password
    One-way => diff to recover password if hacked
    WEAK CR => hard to guess other password with same hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does CHF solve coin tossing online? (Fair protocol to toss a coin)

A
  • A and B agree on a CHF h
  • A picks random int R, sends d = h(R) to B
  • B guesses whether R is odd or even
  • A reveals R to B
  • if B correct, tails, if not, heads
17
Q

What is entropy?

A

= Formal measure of uncertainty in the outcome of a process

= suma de la i=0 la n-1 din ( p(ei) log2( 1/p(ei) ) )