L4 - Ciphers Flashcards

1
Q

What are stream ciphers?

A

Stream ciphers operate on the plaintext a single bit (or
single character) at a time

for instace: Simple substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are substitution and transposition ciphers usually combined?

A
  • Substitution ciphers on their own are usually not very secure
  • Transposition ciphers on their own are also not very secure
  • That is why they are combined with transposition ciphers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a simple columnar transposition cipher?

A

the plaintext is written horizontally onto a piece of graph

paper of fixed width

while the ciphertext is read off vertically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a doule columnar transposition cipher?

A
  • A simple columnar transposition can be broken by tryingout different width/column lengths
  • Putting the ciphertext through a second transposition enhances security
  • In contrast to a simple substitution cipher, where a second application does not increase security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Vigenère cipher?

A

A Polyalphabetic Substitution Cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Playfair?

A

An example of an early block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Homophonic substitution ciphers?

A

Homophonic substitution ciphers try to obscure the
frequencies by mapping a character to more than one code.

For example, “A” could correspond to 5, 13, 25, or 56; while
for “B” this could be 7, 19, 32, or 42.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are monoalphabetic ciphers not very secure?

A

They can be easily broken by employing statistical means such as frequency analysys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a a polyalphabetic substitution cipher?

A
  • A polyalphabetic substitution cipher uses multiple simple substitution ciphers.
  • The particular one used changes with the position of each character of the plaintext
  • There are multiple one-letter keys
  • The first key encrypts the first letter of the plaintext, the second key encrypts the second letter of the plaintext, and so on
  • After all keys are used, you start over with the first key
  • The number of keys determines the period of the cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How secure are polygram substitution ciphers?

A

Still not a very secure way of encrypting data:
This hides the frequencies of individual letters
However, natural languages also show typical frequencies
for n-grams (although the curve is flattened).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Rotor Machines?

A
  • In the 1920s, mechanical encryption devices weredeveloped (to automate the process)
  • Basically, these machines implemented a complexVigenère cipher
  • A rotor is a mechanical wheel wired to perform a general substitution
  • A rotor machine has a keyboard and a series or rotors, where the the output pins of one rotor are connected to the input of another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How secure are polyalphabetic substitution ciphers?

A
  • not very secure
  • code can be broken by analyzing the period
  • Looking at the example below, we notice that KIOV is repeated after 9 letters, NU after 6 letters
  • As 3 is a common divisor of 6 and 9, this is a hint that the period could be 3
  • Knowing which letters were encoded with the same key allows the application of frequency methods again
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a transposition cipher?

A

In a transposition cipher the symbols of the plaintext
remain the same, but their order is changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are polygram substitution ciphers?

A

Instead of encoding single characters, a polygram
substitution cipher encrypts groups of letters

For example, “ABA” could correspond to “RTQ’, while
“ABB” could correspond to “SLL”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are block ciphers?

A

Block ciphers operate on groups of bits (or groups of
characters)

An example of an early block cipher is Playfair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How secure are homophonic substitution ciphers?

A

While they make analysis a bit harder, it doesn’t hide all
statistical properties
With the help of a computer can usually be broken in a few
seconds.

17
Q

What is a monoalphabetic cipher?

A

A simple substitution cipher. Each latter is mapped to another one.

18
Q

What is the Ceasar cipher?

A

An early monoalphabetic substitution cipher.

Each letter is shifted by 3.

19
Q

How does the Vigenere cipher work?

A

C = M + K mod 26