Exam - Encryption Flashcards

1
Q

why internet needs encryption

A

recall: internet packets are relayed to destination through intermediate devices –> therefore could be potentially incercepted

thus need encryption of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

list traditional encryption methods

A

caesar
substitution
vignere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

caesar cipher

A

pick a number X
shift alphabet + or - X places

eg shift +4 –> ABC turns into EFG
XYZ wraps around –> BCD

write out message –> rewrite with shifted alphabet
eg twinky –> xamroc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

substitution cipher

A

randomly rearrange alphabet
ABCDEFG –> SIERMD

spell message using rearranged alphabet
similar to caesar cipher except using random rearrangement instead of shifting letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

vignere cipher

A

pick a keyword –> repeat it
eg KEYKEYKEYKEY

take message and keyword –> convert letters to numeric postions
hello –> 7 4 11 11 14
keyke –> 10 4 24 10 4

add letters in the same position. If over 26 –> keep teh remainder –> obtain encrypted message
h + k –> 17
e + e –> 8
l + y –> 35 –> 9
l + k –> 21
o + e –> 18

Convert encryption numbers back to letters
17, 8, 9, 21, 18 –> RIJVS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vignere cipher in a nutshell

A

Advanced caesar cipher, encryption letter shift is based on a keyword

decryption requires knowing keyword + context of what the message should be –> difficult to maliciously decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

importance of enigma machine

A

highly complex mechanical vignere cipher machine –> SUPER complex

required early computers to decode due to amount of brute force required to break
Caused teh rise of modern computing logic
code cracked by Alan Turing –> gay man punished –> suicide despite immense contributions to war effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

importance of 1-way fxns for modern encryption - why? examples

A

easy to perform (encrypt)
difficult to reverse (decrypt) without partial knowledge of the original process

prime factorization
hash fxn
MD5
Modulo exponentiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

prime factorization

A

take 2 prime numbers –> obtain result

practically impossible to reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

modulo exponentiation

A

written as A^B mod M

interpretted as (A^B)/M = whole# remainder

can be efficiently calculated as
(((A mod M)A mod M)A*mod M) –> recursively * A mod M by B times
^example for A^3 mod M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hash functions + examples

A

use series of complex 1-way fxns to convert text to binary and then sum them –> becomes extremely difficult to decrypt/brute force due to overlap of several fxns

eg MD5 –> convert text to 128 binary string hex code only 16 bytes large
eg ASCII characters stored as 1 byte each –> 8th bit checksum uses hash fxns to check for data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

significance of MD5 encryption

A

any change to original message (capitalization, change of a single character, etc) results in completely different MD5 code

therefore sender + receiver both know what first/last few digits should be
if received message does not match expected –> message was tampered or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES - define + how does it work

A

adv encryption standard

both sender/reciever know a key (secret bit sequence)
message is encrypted using the key –> key is encrypted –> redo encryption cycle for 10 times total

standard, known, encryption method –> requires extreme brute force effort to crack/reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES - how do you securely share the key sequence?

A

public info = random prime # + a base# (for exponentiation)
sender/reciever generate their own private # (random) –> A for sender, B for reciever –> serve as indiv private key#s

Both parties calculate (base)^(pvt#) mod prime –> their own public key #s –> exchange public keys
using other’s public key + own pvt key –> public^pvt mod P = shared secret# (S)

Both parties should have calculated the same number (S) –> this will be used as the key bit sequence for further AES encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AES - real-time checking identities/distinguish imposters?

A

Use unique public/pvt keys –> if encrypt w/pvt key, only the matching public key will decrypt (and vice versa)

sender transmits message + signature (hashed message thats been encrypted with pvt key)
recipient decrypts signature with public key –> obtain hash

using the same hash algo –> MD5 the text message

if new hash matches the decrypted signature hash –> verifies identity of sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

public key usage example - Cicada 3301 validity

A

public key is widely available –> means only the singular person with the private key could have encrypted the message
used to validate sender’s identity/authenticity

17
Q

AES - What if imposters obtain keys for interception/decryption?

A

circle of trust –> vouch for eachother

cybersecurity companies provide trust certificates –> able to vouch for this party
certs expire –> need to be revalidated

meeting unknown systems –> follow the line of trust
meet X –> vouched by Y –> Y is vouched by Z –> you already trust Z, therefore Y and X are trustworthy