Encryption Flashcards

1
Q

Encryption

A

It is a process by which information is changed in a systematic way as to hide its contents from everyone but its intended recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Encryption provides mechanisms for:

A

1) Confidentiality
2) Authentication
3) Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptology

A

Is the branch of science concerned with the concealment of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography

A

The science of creating codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptanalysis

A

The science of breaking codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between codes and ciphers ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Code

A

1) A code** replaces** words, phrases or group of symbols with alternatives (code words) and its purpose is not always for secrecy and provides an alternative way of communicating information. Examples of code would be ASCII code and Morse code.
A code is a result of an encoding process and generally relies on** look-up tables (codebooks)** for the conversion processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cipher

A

A cipher is the output of an encryption process that either replaces data symbols with alternative symbols, or rearranges existing data symbols and the purpose of ciphers is almost always for secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption
Decryption

A

Encryption is the process of transforming data known as plain text into a cipher known as ciphertext
Decryption reverses the process by transforming ciphertext into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are two types of ciphers:

A

1) Substitution cipher
2) Transposition cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Substitution cipher

A

The encryption process systematically manipulates a symbol (or group of symbols) in the plaintext to produce a different symbol (or group of symbols), which becomes the ciphertext.
The order of the symbols do not change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transposition cipher

A

The encryption process ‘scrambles’ the symbols of the plaintext in a systematic way to produce the ciphertext.
The symbols are unchanged but their order is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IMPORTANT: always represent the plaintext in lower case and the ciphertext in UPPERCASE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain how does the Caesar wheel work

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

key

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How the Caesar cipher can be represented
as a numerical algorithm that can be
processed by a computer?

A

Caesar cipher can be represented mathematically using “Modular Arithmetic”

16
Q

Modulus

A

The number of integers in a set

17
Q

The general formula of a Caesar cipher would be expressed as:

A

p+k=c mod n

18
Q

Using the cipher wheel the decryption process simply involves:

A
  • Displacing the outer wheel clockwise a number of places corresponding to the agreed key
  • Translating each ciphertext letter shown on the inner wheel to its equivalent plaintext letter on the outer wheel
19
Q

Complementary pair

A

Two numbers X and Y are said to be complementary pair when X+Y =
modulus

20
Q

Mathematically, the decryption algorithm of a Caesar cipher would be expressed as:

A

p ≡ c + 𝐾 (meaning k bar)mod 26
here 𝑲 (read as K bar) is the decryption key.
And K and 𝐾 form a complementary pair (K+ 𝐾(bar)=26)

21
Q

Symmetric key system

A

only a single key is involved in the encryption and decryption processes

22
Q

A transposition cipher

A

Is an anagram of the plaintext created systematically using a method that can be shared with the recipient so that it can be decrypted

23
Q

Columnar transposition cipher

A

Encryption is performed by reordering the columns of the matrix in some systematic way and then reading of the result to produce the cipher text

24
Q

Breaking (or cracking) a cipher

A

Is to derive the plaintext out of a ciphertext without knowledge of the key and often without the knowledge of the encryption algorithm

25
Q

Strong ciphers
Weak ciphers

A

Strong ciphers take longer to break but are more difficult to use
Weak ciphers are quicker to break into but are easier to use
The choice of a cipher will be determined by the value of information it is designed to protect

25
Q

What determines the strength of a cipher?

A

The strength of a cipher is measured by how long it takes to break it

26
Q

A brute force attack

A

Trying all possible combinations in a key space

27
Q

Key space

A

The number of possible key combinations for a particular algorithm

28
Q

Brute attack notes:

A

The time taken to break a cipher is directly proportional to the key space.
It can be applied to both substitution ciphers and transposition ciphers:
1) substitution: test every key in the key space
2) transposition: test every permutation of the possible transpositions

29
Q

Weakness of a transposition cipher

A

The number of possible permutations to crack a transposition cipher depends on the content of the message.
Transposition cipher is incapable of encrypting a string of identical characters, so it’s easier to break when there are long blocks of identical characters within a string

30
Q

Maths in this section:
Caesar cipher
Calculating time that it’d take a computer to try all possible combinations

A