Introduction Flashcards

1
Q

Cryptosystem

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Substitution cipher

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shift cipher

A

The shift cipher is a special case of the substitution cipher. Instead of forming any permutation we allow only those that shift the alphabet by a specific offset. The offset is the key 0 ≤ k ≤ 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vigenère cipher

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Permutation cipher

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For a cryptosystem we need:

A
  1. to be able to efficiently compute the encryption and decryption functions
  2. that an unauthorised party should not be able to determine the key or the plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute force attack

A

An exhaustive search of a keyspace involves trying all possible decryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kerckhoffs’ desiderata

A
  1. The system should be, if not theoretically unbreakable, unbreakable in practice.
  2. Compromise of the system details should not inconvenience the correspondents.
  3. The key should be rememberable without notes and easily changed.
  4. The cryptogram should be transmissible by telegraphy.
  5. The encryption apparatus should be portable and operable by a single person.
  6. The system should be easy, requiring neither the knowledge of a long list of rules nor mental strain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerckhoffs’ principle

A

Compromise of the system details should not inconvenience the correspondents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cipher text only attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Known plain text attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Chosen plain text attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Chosen cipher text attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computationally secure

A

A cryptosystem is computationally secure if the best algorithm for breaking it requires a computational effort which is greater than the computational resources of the assumed attacker.

  • We need a measure of the computational effort to break the cryptosystem.
  • We can’t prove a system is computationally secure against all attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provable security

A

If the cryptosystem can be broken then we can efficiently solve problem A, where problem A is

  • Well studied
  • Thought to be “difficult”

This is not an absolute proof of security but a proof of the security relative to another problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unconditionally secure

A

A cryptosystem is said to be unconditionally secure if an attacker with infinite computational resources cannot break the system.

17
Q

Vernam cipher

A
18
Q

Vernam cipher as one-time pad

A
19
Q

An unconditionally secure cryptosystem

A