IA 2 - UNIT 4 Flashcards
It is a science that consists of
two complementary fields:
cryptography and cryptanalysis
Cryptology
encompasses the design
of algorithms that are used to achieve
specific security goals.
cryptography
studies techniques with the aim of violating the security goals of these cryptographic algorithms
cryptanalysis
The security goals considered in modern cryptography vary according to its application and include
- confidentiality
- integrity
- authentication
- anonymity
- non-repudiation
The basic primitives in a security system that are used to provide such security goals
cryptographic
primitive
- one of the easiest and simplest cryptographic techniques.
- It is a simple substitution cipher where each letter in the plaintext is shifted a fixed number of places down or up the alphabet.
Caesar Cipher
a form of substitution cipher where the alphabet is reversed. This means that “A” is swapped with “Z”, “B” with “Y”, and so on.
Atbash Cipher
- a polyalphabetic substitution cipher that uses a keyword to shift letters.
- The keyword repeats across the text, creating a unique shift for each letter based on the keyword letter.
Vigenère Cipher
- uses a pair of keys—one public and one private.
- The public key encrypts the message, and only the private key can decrypt it. RSA (Rivest-Shamir-Adleman) is a well-known example of a public-key cryptosystem.
Public-key cryptography
is a symmetric primitive with the purpose of protecting the secrecy of messages sent over an insecure channel.
block cipher
- highest level of security
- was introduced by Shannon and is achieved when the ciphertext does not reveal any information about the plaintext, or in other words, if the plaintext and the ciphertext are statistically independent.
perfect security
- A common model assumed in conventional cryptography
- model where the end-users of the communication channel are assumed trusted.
black-box
model
- The attacker can observe ciphertexts without any access to plaintexts.
- This is the weakest attack scenario and if a block cipher is vulnerable to such an attack, it is considered completely useless.
ciphertext-only
The attacker observes a number of plaintexts and their corresponding ciphertexts
known-plaintext
The attacker can choose plaintexts (ciphertexts) to be encrypted (decrypted) before the attack and observes their corresponding ciphertexts (plaintexts) during the attack.
chosen-plaintext