ECM 1407 Encryption Flashcards
What can modern cryptography be defined as?
The study of mathematical techniques for securing digital data
How does Caesar’s Cipher work?
Shifts each letter by a set amount
e.g. A -> E, B ->F
What are the two principles of cryptography?
Security by obscurity
Kerckhoff’s principle
What is security by obscurity?
Improving security by keeping the algorithm secret
What is Kerckhoff’s principle?
The cipher method must not be required to be secret, and the message must be able to fall into the hands of the enemy
Everything except the keys are public knowledge
What is the mono-alphabetic substitution?
Defines a map from each letter to some letter of the alphabet, where the map is arbitrary, instead of a fixed shift.
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key for encryption and decryption
Asymmetric makes use of a public key for encryption and a private key for decryption
What is a stream cipher?
an encryption technique that works byte by byte to transform plain text into code that’s unreadable to anyone without the proper key.
Stream ciphers are linear, so the same key both encrypts and decrypts messages. And while cracking them can be difficult, hackers have managed to do it.
What is a block cipher?
a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
The block cipher processes fixed-size blocks simultaneously, as opposed to a stream cipher, which encrypts data one byte at a time.
What are the origins of RSA?
A public-key cryptosystem, one of the oldest, that is widely used for secure data transmission. The acronym “RSA” comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977
How does RSA work?
1) Choose 2 large prime numbers p and q
2) Calculate n = p * q
3) z = (p - 1) * (q - 1)
4) Choose e to be relatively prime (no other common factors than 1) to z
5) Choose d such that (d*e) mod z = 1
What are the RSA equations?
M = plaintext block
C = encrypted block
C = M^e mod n
M = C^d mod n
What are 3 examples of digital signatures?
Private keys
Hashing
Tarballs
What is an example of an awry software implementation? What was the issue?
The heartbleed bug
When a word with more characters than specified, the word is promptly returned as expected, but with random spare data that often reveals sensitive data about the machine and its user.
What websites were affected by the heartbleed bug?
- Yahoo!, Imgur, Stack Overflow, Slate, DuckDuckGo
- These sites asked users to promptly change their passwords