Cryptography & Symmetric Key Algorithms Flashcards
Caesar Cipher
1.) Earliest known cypher system used by Julius Caesar to communicate with Cicero in Rome when he was conquering Europe.
2.) ROT3 or Rotate 3. i.e. shift each letter of the alphabet 3 places to the right.
3.) Other names include ROT3, C3. It is monoalphabetic in nature.
4.) Drawback - vulnerable to am attack called ‘frequency analysis’
5.) It is a ‘substitution’ cypher
American Civil War
1.) Union and Confederate forces wanted controls to prevent spying on telegraph lines.
2.) Substitution and transposition
3.) Another system used during civil war was a series of flag signals
4.) Flag signals were developed by an army doctor Albert J. Myer
Enigma
1.) German military industrial complex adapted a commercial code making machine called Ultra for govt. use
2.) 3 to 6 rotors to implement a ‘substitution’ cipher
3.) Th Germans safeguarded the devices and made it extremely difficult for Allied forces to acquire one
Ultra
1.) Allied forces began a top effort known by the code name Ultra to attack the Enigma codes
2.) Polish military successfully reconstructed the Enigma prototype
Japanese Purple Machine
1.) similar to Enigma the Japanese developed this purple machine
2.) The code was broken by the end of world war 2
3.) The Americans were aided by the fact that Japanese communicators used very formal message formats that resulted in large number of similar texts in multiple messages therefore easing the cryptanalytic efforts.
Four fundamental goals of cryptography
Confidentiality
Integrity
Authentication
Non-repudiation
Data at Rest
Data that resides in a permanent location awaiting access.
e.g. data on hard drives, backup tapes, cloud storage devices, USB devices
Data in Motion
Also called ‘data on the wire’ refers to data transmitted across a n/w
Confidentiality
Data remains private while at rest and in motion
Integrity
Ensures data is not modified without authorisation
Authentication
Verifies the claimed identity of system users
Non repudiation
Provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender
Kerchoff Principle
1.) The cryptographic system should be secure even if everything about the system except the key is public knowledge
2.) The principle can be summed up as ‘the enemy knows the system’
Private key cryptosystems
1.) All participants use a single shared key
Public key cryptosystems
1.) Each participant has their own pair of keys