IA 2 - UNIT 4 Flashcards

1
Q

It is a science that consists of
two complementary fields:
cryptography and cryptanalysis

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encompasses the design
of algorithms
that are used to achieve
specific security goals.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

studies techniques with the aim of violating the security goals of these cryptographic algorithms

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The security goals considered in modern cryptography vary according to its application and include

A
  1. confidentiality
  2. integrity
  3. authentication
  4. anonymity
  5. non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The basic primitives in a security system that are used to provide such security goals

A

cryptographic
primitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • one of the easiest and simplest cryptographic techniques.
  • It is a simple substitution cipher where each letter in the plaintext is shifted a fixed number of places down or up the alphabet.
A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a form of substitution cipher where the alphabet is reversed. This means that “A” is swapped with “Z”, “B” with “Y”, and so on.

A

Atbash Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • a polyalphabetic substitution cipher that uses a keyword to shift letters.
  • The keyword repeats across the text, creating a unique shift for each letter based on the keyword letter.
A

Vigenère Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • uses a pair of keys—one public and one private.
  • The public key encrypts the message, and only the private key can decrypt it. RSA (Rivest-Shamir-Adleman) is a well-known example of a public-key cryptosystem.
A

Public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a symmetric primitive with the purpose of protecting the secrecy of messages sent over an insecure channel.

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • highest level of security
  • was introduced by Shannon and is achieved when the ciphertext does not reveal any information about the plaintext, or in other words, if the plaintext and the ciphertext are statistically independent.
A

perfect security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A common model assumed in conventional cryptography
  • model where the end-users of the communication channel are assumed trusted.
A

black-box
model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • The attacker can observe ciphertexts without any access to plaintexts.
  • This is the weakest attack scenario and if a block cipher is vulnerable to such an attack, it is considered completely useless.
A

ciphertext-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The attacker observes a number of plaintexts and their corresponding ciphertexts

A

known-plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The attacker can choose plaintexts (ciphertexts) to be encrypted (decrypted) before the attack and observes their corresponding ciphertexts (plaintexts) during the attack.

A

chosen-plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On top of the chosen-plaintext (ciphertext) capabilities mentioned above, the attacker can choose plaintexts (ciphertexts) during the attack based on some intermediate results obtained during the attack.

A

Adaptively chosen-plaintext

17
Q

The attacker can encrypt (decrypt) plaintexts (ciphertexts) with the attacked key and other keys related to it, where such relation is known or even chosen by the attacker.

A

Related-key

18
Q

a technique for analyzing block ciphers by examining how differences in input plaintexts lead to differences in output ciphertexts. It identifies statistical patterns that can be exploited to uncover key information

A

Differential cryptanalysis

19
Q

a statistical method for analyzing block ciphers by finding linear relationships between plaintext, ciphertext, and key bits. It aims to exploit these relationships to recover key information.

A

Linear cryptanalysis

20
Q

a hybrid attack method that combines differential and linear cryptanalysis to exploit vulnerabilities in block ciphers.

A

Differential-linear cryptanalysis

21
Q

extends traditional differential cryptanalysis by analyzing not just first-order differences but also higher-order differences in the input and output of block ciphers to uncover vulnerabilities.

A

Higher order differential cryptanalysis

22
Q

a method that analyzes specific truncated differences in plaintext and ciphertext, allowing attackers to focus on subsets of bits rather than requiring full matches.

A

Truncated differential cryptanalysis

23
Q

a technique that analyzes block ciphers by exploiting specific combinations of input bits (integrals) and their predictable output patterns over multiple rounds.

A

Integral cryptanalysis

24
Q

a method that exploits specific input differences that cannot produce certain output differences in a block cipher, using these impossibilities to aid in key recovery.

A

Impossible differential cryptanalysis

25
Q

new trends in cryptanalysis of
block ciphers

A
  1. Adapting Machine Learning in Cryptanalysis
  2. Quantum Computing Impacts
  3. Exploring Side-channel Attacks
26
Q

The integration of machine learning techniques into cryptanalysis has shown promise for automating and improving attack efficacy.

A

Adapting Machine Learning in Cryptanalysis

27
Q

With the rise of quantum computing, traditional
cryptanalysis techniques are challenged,
necessitating new strategies for block ciphers.

A

new trends in cryptanalysis of
block ciphers

28
Q

Side-channel attacks exploit physical
implementations
of cryptographic algorithms, providing new avenues for breaking block ciphers.

A

Exploring Side-channel Attacks

29
Q

attacks on block ciphers

A
  1. Differential cryptanalysis
  2. linear cryptanalysis
  3. Differential-linear cryptanalysis
  4. Higher order differential cryptanalysis
  5. Truncated Differential Cryptanalysis
  6. Integral Cryptanalysis
  7. Impossible Differential Cryptanalysis