Foundations of Cryptology Flashcards

1
Q

Decryption?

A

Restoring plaintext from ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

plaintext?

A

Original, non-coded message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption?

A

Converting plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext?

A

Result of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptosystem?

A

System for encrypting and decrypting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis?

A

Techniques for deciphering messages without encryption details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptography?

A

Study of secure communication techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptology?

A

Encompasses both cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Generic Encryption Notation?

A

c = Ek(m); m = Dkı(c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Caesar Cipher?

A

-Overview: Early substitution cipher used by Julius Caesar. mono-alphabetic
-Mechanism: Shifts each letter three places to the left.
-Vulnerability: Susceptible to frequency analysis due to its simplicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vigenère Cipher?

A

-Overview: Polyalphabetic substitution cipher developed by Blaise de Vigenère.
-Mechanism: Uses a repeating keyword to shift letters.
-Strength: Multiple ciphertext letters for each plaintext letter.
-Weakness: Vulnerable to cryptanalysis due to shared frequency distribution a
statistical technique can be applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One-Time Pads?

A

Overview: Perfect encryption scheme, invented by Gilbert Vernam.
Mechanism: Uses a pad of random values and the XOR operation.
Requirements: The pad must be used only once, as long as the message, is securely distributed, and truly random.
Practicality: Impractical due to cumbersome key management and distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steganography?

A

Definition: Hiding data within another media type to conceal its existence.
Methods: Character marking, invisible ink, typewriter correction ribbon, least significant bit alterations in images.
Usage: Information theft, digital watermarks for intellectual property protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nonce?

A

Definition: A random number used once in a cryptographic function.
Purpose: Adds randomness to the encryption process to strengthen it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Initialization Vector (IV)?

A

Definition: Random values used with algorithms to prevent pattern creation during encryption.
Usage: Ensures identical plaintext values do not produce the same ciphertext when encrypted with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero-Knowledge Proof?

A

Definition: Proving knowledge of a fact to a third party without revealing the fact itself.
Example: Proving knowledge of a password without disclosing it.

17
Q

Split Knowledge?

A

Definition: Dividing information or privilege among multiple users to prevent any single person from compromising security.
Example: Key escrow, where a secret key is held by a third party until certain conditions are met.

18
Q

Goals of Cryptography?

A

-Confidentiality: Ensuring that information is not accessible to unauthorized individuals.
-Integrity: Ensuring that information is accurate and complete.
-Authentication: Verifying the identity of individuals and entities.
-Non-repudiation: Preventing individuals from denying their actions.

19
Q

Key

A

Definition: A piece of information, usually a string of numbers or letters, used in cryptographic algorithms to encode or decode data.
Types: Can vary in size and form based on the cryptographic method.
Security: The strength of encryption depends on the security of the key, influenced by:
The algorithm used.
The size of the key.
How the key is generated.
The key exchange process

20
Q

Three Dimensions of Cryptographic
Systems?

A

1-the type of operation used for encryption.
2-number of keys used
3-the way the plaintext is processed

21
Q

The Kerckhoff Principle

A

Principle: The security of a cryptosystem should rely on the secrecy of the key, not the algorithm.

22
Q

Ciphers?

A

Monoalphabetic Cipher: Substitution cipher using a fixed key.
Polyalphabetic Cipher: Uses multiple substitution alphabets to improve security.
Running Key Cipher: Uses a key based on a book or document.
Concealment Cipher: Hides the message within another message.
Block Cipher
Stream Cipher

23
Q

Types of Operations in Ciphers?

A

Transposition: Rearranges letters of plaintext.
Substitution: Replaces each character or bit of plaintext with a different character.

24
Q

Other Techniques Used in Ciphers?

A

Compression: Reduces redundancy before encryption.
Expansion: Increases plaintext size to match key sizes.
Padding: Adds material to the plaintext before encryption.
Key Mixing: Uses subkeys to limit key exposure.

25
Q

Two Attributes of Ciphers?

A

Confusion: Complicates the relationship between plaintext and key, achieved by substitution.
Diffusion: Spreads changes in plaintext throughout ciphertext, achieved by transposition.

26
Q
A