Domain 3: Cryptography Flashcards

1
Q

What is Plaintext?

A

An unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ciphertext?

A

an Encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptology?

A

the science of secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Symmetric Encryption?

A

Encryption that uses one key encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Asymmetric Encryption?

A

Encryption that uses two keys; if you encrypt with one, you may decrypt the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Cryptography?

A

creates messages whose meaning is hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Cryptanalysis?

A

the science of breaking Encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is important to remember that Cryptology encompasses two disciplines. what are they?

A

Cryptography

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Cipher?

A

A Cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Plaintext?

A

An unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Encryption?

A

Converts Plaintext into Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptography provides which parts of Confidentiality Integrity Availability (CIA)

A

Confidentiality

Integrity

but not Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptography provides which parts of Identity - Authentication - Authorization – Accountability: IAAA)

A

Proving an Identity Claim

Identity - Authentication

but not Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

can Cryptography provide Non-repudiation?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Confusion?

A

The relationship between the Plaintext and the Ciphertext should be as random (Confused) as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Permutation?

A

Provides Confusion by rearranging the Plaintext anagram-style

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Diffusion?

A

The order of the Plaintext should be dispersed (Diffused) in the Ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are Permutation and Substitution are often combined?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Substitution?

A

Provides diffusion by replacing one character for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should Strong Encryption accomplish?

A

Should destroy patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What metric is used to determine if a cipher uses strong encryption?

A

If a single bit of Plaintext changes, the odds that all of the bits of the resulting Ciphertext should be 50% or greater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do Cryptanalysts look for to break an encryption?

A

Any signs of nonrandomness may be used as clues to a Cryptanalyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In Cryptanalysis what is the Work Factor?

A

Describes how long it will take to break a cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In Cryptanalysis, what is Breaking a Cryptosystem:

A

Decrypting Ciphertext without a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Does Secrecy of the cryptographic algorithm provide strength?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Monoalphabetic Ciphers:

A

Uses one alphabet for substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a weakness to Monoalphabetic Ciphers?

A

Susceptible to Frequency Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Polyalphabetic Cipher?

A

Uses multiple alphabets for substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Frequency Analysis?

A

The study of the frequency of letters or groups of letters in a ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Modular Math?

A

It shows you the remainder

31
Q

What is another name for Modular Math?

A

Clock Math

32
Q

Why is Modular Math Cryptology?

A

is is the underlying math behind a lot Cryptography.

33
Q

What does Exclisive OR mean?

A

A Boolean operator that returns a value of TRUE only if both its operands have different values.

an exclusive OR means “this or that, but not both.”

An exclusive OR is often called an XOR or EOR.

34
Q

What does XOR stand for?

A

Exclusive Or

35
Q

What is the First known example of secret writing

A

Egyptian Hieroglyphics

36
Q

What is Egyptian Hieroglyphics?

A

Stylized pictorial writing used in ancient Egypt.; Some contained small puzzles

37
Q

What is Spartan Scytale?

A

Used in Ancient Sparta around 400 BC

A strip of parchment wrapped around a rod.

Plaintext written lengthwise down the rod.When unwound, the parchment was unreadable

The receiver possessed a rod of equal length and diameter.

38
Q

What is a Rotation Ciphers ?

A

Used by Gaius Julius Caesar; rotated each letter of the plaintext three times to encrypt (A became D)

39
Q

What is a another name for a Rotation Ciphers ?

A

Caesar Cipher

40
Q

What is a Vigenére Ciphers?

A

A Polyalphabetic rotational Cipher named after Blaise de Vigenére

41
Q

How does a Vigenére Ciphers work?

A

It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers.

Top Row holds the plaintext
Left Column holds the Ciphertext

The person sending the message chooses a keyword and repeats it until it matches the length of the plaintext

42
Q

is the Vigenére Ciphers a Polyalphabetic Cipher or a Monoalphabetic Cipher?

A

Polyalphabetic Cipher

43
Q

How do you encrypt with a Vigenére Ciphers ?

A
44
Q

How do you decrypt with a Vigenére Ciphers ?

A
45
Q

What is a Cipher Disk?

A

Two concentric disks with an alphabet around the periphery.

46
Q

What is a Monoalphabetic Cipher Disk?

A

Two parties agree on a fixed offset: Set S to D.

47
Q

What is a Polyalphabetic Cipher Disk?

A

Same as Monoalphabetic,

Two parties agree on a fixed offset: Set S to D.

but then the two parties agree to turn the wheel every X characters.

48
Q

What is a a set of Jefferson Disks?

A

36 Wooden Disks each with 26 letters in random order.

49
Q

How do you encrypt with Jefferson Disks?

A

Arrange the first 36 letters along one line on the disks

Pick any other line and write down the Ciphertext

50
Q

What is a Book cipher?

A

Uses whole words from a well known text.

51
Q

How do you decrypt with Jefferson Disks?

A

Arrange the Ciphertext along one line on the disks

The recipient looks at all other 25 lines for something that makes sense.

52
Q

How do you encrypt with a Book cipher?

A

Agree on a text

For each word in the plain text, note the

Page Number
Line
Word offset

Example from Benedict Arnold to Nathan Bailey

As 158.9.25 and 115.9.12 are 226.9.3

As Life and Fortune are risked

53
Q

What is a Running Key Cipher?

A

Uses a well known text but uses modulus math to add letters to each other

54
Q

How do you encrypt with a Running Key Cipher?

A
55
Q

What is a Code Book?

A

Assign a code word for important people, locations and terms. In some cases, assign more than one code word.

56
Q

What is a One Time Pad?

A

Uses identical paired pads of random characters with a set amount of characters on each page.

57
Q

How do you encrypt with a One Time Pad?

A

Align the plaintext along the random characters and perform modulo math.

58
Q

What is the only encryption method that is mathematically proven to be secure?

A

One-Time Pad

59
Q

What are the three prerequisites to ensure that one-time pads are the only encryption method that is mathematically proven to be secure?

A

1: If the characters are truly random,
2: The pads are kept secure
3: No one page is ever re-used.

60
Q

What is a Vernam Cipher?

A

A teletypewriter that encrypted and decrypted using paper rolls as the one time pad.

The bits were XORd

First known use invented by Gilbert Vernam in 1917.

61
Q

Why does Brute Forcing One-Time Pads not work?

A

Since the key of a one-time-pad is the same length as the Plaintext, brute forcing every possible key will eventually recover the Plaintext, but it will also produce vast quantities of other potential Plaintexts including the works of Shakespear.

62
Q

What is a Hebern Machines ?

A

The Hebern Rotor Machine was an electro-mechanical encryption machine built by combining the mechanical parts of a standard typewriter with the electrical parts of an electric typewriter, connecting the two through a scrambler.

It is the first example (though just barely) of a class of machines known as rotor machines that would became the primary form of encryption during World War II and for some time after, and which included such famous examples as the German Enigma.

63
Q

A Hebern Machine is what kind of encryption machine?

A

Rotor Machine

64
Q

What is the Enigma machine?

A

A Rotor Encryption machine that used three finger wheels that could be set to any number from 1-26

used by the Germans in WWII.

65
Q

How do you encrypt with an Enigma machine?

A

type the plaintext into the typewriter. The wheels will turn and a lamp illuminated with the Ciphertext.

66
Q

How do you decrypt with an Enigma machine?

A

set the wheels to the original position and type the Ciphertext. The lamp will illuminate the plaintext.

67
Q

What is the SIGBA machine?

A

Improvement to the Enigma used by the US.

Never broken.

68
Q

What is the Purple (Red and Jade) machine?

A

Rotor-like device used by the Japanese

Actually a stepping switch device

69
Q

How did the intelligence community view the technology behind cryptanalysis

A

Arguably as powerful as any bomb and tried to regulate it through the same munitions laws.

70
Q

Why is the Coordinating Committee for Multilateral Export Controls (COCOM) important?

A

Designed to control the export of critical technologies to Iron Curtain countries between 1947 and 1994.

Export of encryption technologies by members to non-COCOM countries (US, Australia, Turkey, non-soviet union countries in Europe) was heavily restricted.

71
Q

What does COCOM stand for?

A

The Coordinating Committee for Multilateral Export Controls

72
Q

What is the Wassenaar arrangement?

A

Created in 1996 after COCOM ended, it included many more countries including former soviet union countries and greatly relaxed the restrictions on exporting cryptography.

73
Q
A