Cryptology Flashcards
Encryption is…
A method of transforming readable data, called plaintext, into a form that appears to be random and unreadable, which is called ciphertext. It can be created through hardware components or program code in an application
Cryptosystem is
A system or product that provides encryption and decryption.
Algorithm
The set of rules also known as Ciphers, dictates how enciphering and deciphering take place.
In Encryption, the Key also known as cryptovariable
Is a value that comprises a large sequence of random bits.
Algorithm contains keyspace, which
Is a range of values that can be used to construct a key.
When algorithm need to generate a new key, it uses random value from the keyspace
Cryptosystem encompasses all the necessary components for encryption and decryption to take place. A Cryptosystem is made up of at least the following:
- Software
- Protocols
- Algorithms
- Keys
Example of a Cryptosystem
Pretty Good Privacy (PGP)
Crytosystems can provide the following services:
- Confidentiality
- Integrity
- Authentication
- Authorization
- Nonrepudiation
Cryptography is
Practice of storing and transmitting information in a form that only authorized parties can understand
Kerckhoff’s Principle:
August Kerckhoffs published a paper in 1883
Stating that the only secrecy involved with a cryptography should be the key. He claimed that the algorithm should be publicly exploit.
The strength of an encryption method comes from:
- the algorithm
- the secrecy of the key
- the length of the key
- how all work together within a cryptosystem
Breaking Cryptosystem can be accomplished by a….
Brute-force attack
Another name for cryptography strength is_____
Workfactor (work function), which is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem
(Time and effort to break a protective measure)
One-Time Pad, which is invented by Gilbert Vernam in 1917 (aka Vernam Cipher) is a ______
Perfect encryption scheme because it is considered unbreakable if implemented properly
One-Time pad is made up of random bits. This encryption process uses a binary mathematic function called…..
Exclusive-OR (XOR)
XOR (exclusive-OR) is an operation that is applied to 2 bits. When combing the bits: if both values are same the result is ____. If the bits are different from each other, the result is ____.
1 XOR 1 = 0
1 XOR 0 = 1
One-Time pad Requirements. (To be successful)
- Made up on truly random values
- Used only one time
- securely distributed to its destination
- secured at sender’s and receiver’s sites
- At least as long as the message
The Cryptographic life cycle is the….
Ongoing process of identifying your cryptography needs, selecting the right algorithms, provisioning the needed capabilities and services, and managing keys.
Cryptographic methods
- Symmetric Key (aka Secret key)
- Assymmetric key (Public and private key)
A variant of the approach is called ECC ( Elliptic Curve Cryptography)
Symmetric Key Cryptography:
- the sender and receiver use two instances of the same key for encryption and decryption.
- Key has dual functionality, it carry both encryption and decryption processes.
- Also called Secret Keys
- one separate key for each friend or receiver.
- depends on how well users protect their secret keys
- Provide confidentiality
- examples: AES (Advanced Encryption Standard) and ChaCha20
Advantages Symmetric Key
- Much Faster
- Hard to break if using a large key size
Block Ciphers
- Is used for encryption and decryption purposes, the message is divided into blocks of bits.
- these blocks are then put through mathematical functions, one block at a time.
A strong Cipher contains right level of 2 main attributes: Confusion and Diffusion….
- Confusion: is commonly carried out by substitution
- Diffusion: is carried out by using transposition
More on Confusion and Diffusion:
In algorithms,
- diffusion takes place as individual bits of a block are scrambled, or diffused, throughout that block.
- Confusion is provided by carrying out complex substitution functions so the eavesdropper cannot figure out how substitute the right values and come up with the plaintext.