IA 2 - UNIT 4 Flashcards
It is a science that consists of
two complementary fields:
cryptography and cryptanalysis
Cryptology
encompasses the design
of algorithms that are used to achieve
specific security goals.
cryptography
studies techniques with the aim of violating the security goals of these cryptographic algorithms
cryptanalysis
The security goals considered in modern cryptography vary according to its application and include
- confidentiality
- integrity
- authentication
- anonymity
- non-repudiation
The basic primitives in a security system that are used to provide such security goals
cryptographic
primitive
- one of the easiest and simplest cryptographic techniques.
- It is a simple substitution cipher where each letter in the plaintext is shifted a fixed number of places down or up the alphabet.
Caesar Cipher
a form of substitution cipher where the alphabet is reversed. This means that “A” is swapped with “Z”, “B” with “Y”, and so on.
Atbash Cipher
- a polyalphabetic substitution cipher that uses a keyword to shift letters.
- The keyword repeats across the text, creating a unique shift for each letter based on the keyword letter.
Vigenère Cipher
- uses a pair of keys—one public and one private.
- The public key encrypts the message, and only the private key can decrypt it. RSA (Rivest-Shamir-Adleman) is a well-known example of a public-key cryptosystem.
Public-key cryptography
is a symmetric primitive with the purpose of protecting the secrecy of messages sent over an insecure channel.
block cipher
- highest level of security
- was introduced by Shannon and is achieved when the ciphertext does not reveal any information about the plaintext, or in other words, if the plaintext and the ciphertext are statistically independent.
perfect security
- A common model assumed in conventional cryptography
- model where the end-users of the communication channel are assumed trusted.
black-box
model
- The attacker can observe ciphertexts without any access to plaintexts.
- This is the weakest attack scenario and if a block cipher is vulnerable to such an attack, it is considered completely useless.
ciphertext-only
The attacker observes a number of plaintexts and their corresponding ciphertexts
known-plaintext
The attacker can choose plaintexts (ciphertexts) to be encrypted (decrypted) before the attack and observes their corresponding ciphertexts (plaintexts) during the attack.
chosen-plaintext
On top of the chosen-plaintext (ciphertext) capabilities mentioned above, the attacker can choose plaintexts (ciphertexts) during the attack based on some intermediate results obtained during the attack.
Adaptively chosen-plaintext
The attacker can encrypt (decrypt) plaintexts (ciphertexts) with the attacked key and other keys related to it, where such relation is known or even chosen by the attacker.
Related-key
a technique for analyzing block ciphers by examining how differences in input plaintexts lead to differences in output ciphertexts. It identifies statistical patterns that can be exploited to uncover key information
Differential cryptanalysis
a statistical method for analyzing block ciphers by finding linear relationships between plaintext, ciphertext, and key bits. It aims to exploit these relationships to recover key information.
Linear cryptanalysis
a hybrid attack method that combines differential and linear cryptanalysis to exploit vulnerabilities in block ciphers.
Differential-linear cryptanalysis
extends traditional differential cryptanalysis by analyzing not just first-order differences but also higher-order differences in the input and output of block ciphers to uncover vulnerabilities.
Higher order differential cryptanalysis
a method that analyzes specific truncated differences in plaintext and ciphertext, allowing attackers to focus on subsets of bits rather than requiring full matches.
Truncated differential cryptanalysis
a technique that analyzes block ciphers by exploiting specific combinations of input bits (integrals) and their predictable output patterns over multiple rounds.
Integral cryptanalysis
a method that exploits specific input differences that cannot produce certain output differences in a block cipher, using these impossibilities to aid in key recovery.
Impossible differential cryptanalysis
new trends in cryptanalysis of
block ciphers
- Adapting Machine Learning in Cryptanalysis
- Quantum Computing Impacts
- Exploring Side-channel Attacks
The integration of machine learning techniques into cryptanalysis has shown promise for automating and improving attack efficacy.
Adapting Machine Learning in Cryptanalysis
With the rise of quantum computing, traditional
cryptanalysis techniques are challenged,
necessitating new strategies for block ciphers.
new trends in cryptanalysis of
block ciphers
Side-channel attacks exploit physical
implementations of cryptographic algorithms, providing new avenues for breaking block ciphers.
Exploring Side-channel Attacks
attacks on block ciphers
- Differential cryptanalysis
- linear cryptanalysis
- Differential-linear cryptanalysis
- Higher order differential cryptanalysis
- Truncated Differential Cryptanalysis
- Integral Cryptanalysis
- Impossible Differential Cryptanalysis