Encryption/Cryptography-General Flashcards

1
Q

Goals of Cryptography

A

Confidentiality
Integrity
Authentication
Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Kerckhoff’s Principle

A

A crypto system should remain secure if everyone about it is known (except the key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AND logical operation function

A

^ Symbol: (X^Y) and the value is true when both values (X and Y) are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OR logical operation function

A

V Symbol: (X v Y): The output is true when at least 1 input is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NOT logical operation function

A

~ Symbol: ~X or ~Y: It reverses the input value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exclusive OR logical operation function

A

O with cross symbol: It outputs true when only 1 of the inputs is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modulo function

A

The remainder left over from division

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Work function

A

Amount time/cost to brute force through a crypto system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Codes versus Ciphers

A

Code: Crypto graphic system of symbols used to represent words/phrases, but not designed to ensure confidentiality. Example is the 10 system used by law enforcement

Cypher: Specifically designed to generate confidential cipher text from input and using algorithm to scramble input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transposition Cipher

A

Rearranges the plaintext characters to create the cipher text using a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Substitution Ciphers

A

Uses algorithm to replace plaintext characters with cipher text characters. Example Caesar Cipher where each character is just shifted three positions to the right. Also known is ROT3 cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Caesar Cypher formula

A

C= (P+3) mod 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One-time Pads

A

Uses a different substitution alphabet for each character of plain text. The Pad is at least as long as the original message. Unbreakable if used correctly. Must be generated randomly. The pad must be physical protected. AKA Vernam Ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vigenère cipher.

A

Substitution cipher that uses multiple alphabets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Running Key Ciphers

A

Uses text from a book or newspaper as the cipher key. Prevents having to exchange physical lengthy one-time pads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block Cipher

A

Applies encryption algorithm to chunks of plain text at a time. Transposition ciphers are an example.

17
Q

Stream Ciphers

A

Operates on 1 bit or character of plain text at a time. Substitution and one-time pads are examples.

18
Q

Confusion and Diffusion

A

Confusion is when the relationship between the plain text and the key is very confusing and can’t be predicted. Diffusion is when 1 change in plain text results in multiple changes in cipher text. These both help protect crypto systems.

19
Q

Size of Binary Keyspace

A

2 to the number of bits in the key

20
Q

Symmetric versus asymmetric algorithm examples

A

Symmetric: IDEA, 3DES, Skipjack, AES, RC
Asymmetric: RSA