Domain 3 - Security Architecture and Engineering (Cryptography) Flashcards
What is the Purple Machine?
It’s the Japanese version of the Enigma which they used during WW2
What is the Scytale Cipher?
Used by the Spartans, it would be a message written on paper that needs to be wrapped around a specific width of a rod to make sense.
What is the Vigenere Cipher?
Uses a grid. Key must be as long as the message. Match row of plaintext with column of key to encrypt.
What are the four goals of Cryptography?
Confidentiality, Integrity, Authentication and Nonrepudiation.
What are Symmetric Cryptosystems?
Use a shared secret key available to all users of the cryptosystem.
What are Asymmetric Cryptosystems?
Use individual combinations of public and private keys for each user.
Which Cryptosystem does not provide nonrepudiation?
Symmetric.
What is the Key Space of an Algorithm?
How many unique keys are possible (determined by it’s Bit Space).
What is a Bit Space of an Algorithm?
The number of bits within a key (128-bit etc). A bit referring to a single binary number.
What is the Kerchoff Principle?
Cryptographic systems should be secure, even if everything about how the system works is know.
What are Cryptovariables?
Another word for Cryptographic Keys.
Explain the AND operation
The AND operation checks to see whether two values are both true. 1 ^ 1 = 1
What is the symbol for the AND operation?
What operation does this symbol represent (^)?
AND
Explain the OR operation
The OR operation checks to see whether at least one of the input values are true.
Explain the NOT operation
The NOT operation reverses the value of an input variable.
What is the symbol for the NOT operation?
~ or !
What does the Modulo Function do?
Wraps around like with a ceaser cipher
What is a Nonce?
A nonce is a random number that acts as a placeholder variable (an IV is an example)
What does Zero-Knowledge proof mean?
Prove your knowledge of a fact to a third party without revealing the fact itself.
What does Split Knowledge mean?
The separation of duties and two-person control contained in a single solution is called Split Knowledge.
What is a Work Function?
You can measure the strength of a cryptographic system by measuring the effort in terms of computing power to crack a cipher.
What is the difference between a Code and a Cipher?
Code can be public knowledge like 10-4
What is a Transposition Cipher?
Transposition Ciphers use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.
What is Columnar Transposition?
FIND DEFINITION
What are Polyalphabetic substitution ciphers?
Polyalphabetic substitution ciphers use multiple alphabets in the same message to hinder decryption efforts
What does Polyalphabetic Substitution ciphers protect against?
Frequency Analysis
What is a Vernam Cipher?
A one-time pad.
What are One Time Pads also called?
Vernam Ciphers.
What is a Running Key cipher?
It’s using a commonly available book for one time pad messages
What are Running Key Ciphers also known as?
Book Ciphers