Intro to Cryptography Flashcards

1
Q

What is Kerckhoffs’s Principle

A

A crypto system should be secure, even if everything about the system, except the key, is public knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Kerckhoffs’s principle relevant in encrypted communications?

A

It allows for the possibility that the entire encrypted message and even the encryption algorithm used to produce it, may be intercepted by an attacker without compromising the overall security of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an algorithm in Cryptography?

A

A set of rules that dictate how we encode and decode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 main goals of Cryptography?

A

1) Confidentiality
2) Integrity
3) Authentication
4) Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does cryptography do in terms of confidentiality and what are the two main cryptosystems?

A

Keeping data confidential in rest, transit and during processing

Symmetric Cryptosystems (shared secret key)

Asymmetric Cryptosystems (public and private keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is cryptography used for Integrity?

A

Ensures data has not been altered in any way without authorisation

Designed to ensure information is not altered/deleted by malicious third party or by accident

Message integrity established through use of encrypted message digests (digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is cryptography used in authentication?

A

Ensures that the identity of a user is valid and verified

I am who I say I am (challenge and response encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is Nonrepudiation used in cryptography?

A

Provides assurances to the recipient that the message originated from the sender and not someone else, pretending to be the sender

Prevents the sender denying that they sent the message

Provided by public key cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a code and a cipher?

A

A code is not always secret and used more to prevent ambiguity (sounding the same). Substitute arbitrary symbols

Ciphers are designed to hide the true meaning of the information

Ciphers use algorithms to transform a message into an apparently random string of characters

Converts plain text to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Transposition Cipher?

A

One of the most simple ciphers

Uses an algorithm to rearrange the letters of plain text to create a cipher text e.g. apple reversed to “elppa”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can the complexity of transposition ciphers be increased?

A

Using columnar transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does columnar transposition work?

A

Remove all the spaces between the words

Write the message in (4) rows of (7) columns

Read the letters in order down the columns instead of along the rows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Caesar Cipher?

A

AKA ROT3 (rotate 3)

Imagine the alphabet written on a wheel

Encrypt by shifting each letter 3 letters to the right
(A becomes D, B becomes E)

Decrypt by rotating to the left

Could be a rotate 4, 5, 6…..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes a good Caesar Cipher?

A

Can handle any rotation

Can handle upper case and lower case without drifting into special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly