Cryptography & Symmetric Key Algorithms Flashcards

1
Q

Caesar Cipher

A

1.) Earliest known cypher system used by Julius Caesar to communicate with Cicero in Rome when he was conquering Europe.
2.) ROT3 or Rotate 3. i.e. shift each letter of the alphabet 3 places to the right.
3.) Other names include ROT3, C3. It is monoalphabetic in nature.
4.) Drawback - vulnerable to am attack called ‘frequency analysis’
5.) It is a ‘substitution’ cypher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

American Civil War

A

1.) Union and Confederate forces wanted controls to prevent spying on telegraph lines.
2.) Substitution and transposition
3.) Another system used during civil war was a series of flag signals
4.) Flag signals were developed by an army doctor Albert J. Myer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enigma

A

1.) German military industrial complex adapted a commercial code making machine called Ultra for govt. use
2.) 3 to 6 rotors to implement a ‘substitution’ cipher
3.) Th Germans safeguarded the devices and made it extremely difficult for Allied forces to acquire one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ultra

A

1.) Allied forces began a top effort known by the code name Ultra to attack the Enigma codes
2.) Polish military successfully reconstructed the Enigma prototype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Japanese Purple Machine

A

1.) similar to Enigma the Japanese developed this purple machine
2.) The code was broken by the end of world war 2
3.) The Americans were aided by the fact that Japanese communicators used very formal message formats that resulted in large number of similar texts in multiple messages therefore easing the cryptanalytic efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Four fundamental goals of cryptography

A

Confidentiality
Integrity
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data at Rest

A

Data that resides in a permanent location awaiting access.
e.g. data on hard drives, backup tapes, cloud storage devices, USB devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data in Motion

A

Also called ‘data on the wire’ refers to data transmitted across a n/w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

Data remains private while at rest and in motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Ensures data is not modified without authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication

A

Verifies the claimed identity of system users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non repudiation

A

Provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerchoff Principle

A

1.) The cryptographic system should be secure even if everything about the system except the key is public knowledge
2.) The principle can be summed up as ‘the enemy knows the system’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private key cryptosystems

A

1.) All participants use a single shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public key cryptosystems

A

1.) Each participant has their own pair of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography, Crypto analysis and Ctryptology

A

1.) Cryptography - creating and implementing secret codes and ciphers
2.) Cryptanalysis - the study of methods to defeat codes and ciphers
3.) Cryptology - together cryptography and cryptanalysis is called Cryptology

17
Q

FIPS 140-2

A

‘Security Requirements for Cryptographic Modules’ defines the hardware and software requirements for cryptographic modules that federal government uses.