Lecture 1 Flashcards

1
Q

What are the three steps in cryptography?

A
  1. Precisely identify a threat model (CPA, CCA, etc.) 2. Propose a construction (solution) 3. Prove that breaking the construction would mean solving a hard problem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cipher?

A

The algorithm to encrypt and decrypt plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main property of a cipher?

A

Applying encryption followed by decryption should result in the same plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext only attack

A

You only have a singular ciphertext and you are trying to figure out the plaintext (hardest attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Known Plaintext Attack

A

You know plaintext and ciphertext and now you are reverse engineering it to figure out the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chosen plaintext attack (CPA)

A

Eve can pick a plaintext to send to challenger and can send any number of plaintexts to help her detect key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chosen Ciphertext Attack (CCA)

A

Eve can send challenger both plaintext to encrypt and ciphertext to decrypt until she figures out the key (MOST powerful attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is symmetric encryption?

A

You use the same secret key to both encrypt and decrypt the ciphertext (so both parties need to know the key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why does Kerckhoff’s principle make sense?

A

The principle states that the security of an encryption scheme should rely on the secrecy of the key not the encryption algorithm. This makes sense because keeping an algo secret means if it gets leaked you have to change the whole scheme vs just changing the key. Also the key is easier to hide than a whole algorithm scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One time key concept

A

The key is used to encrypt only one message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Many time key

A

Key can encrypt multiple messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two cones of cryptography?

A

Establishing a secret key, securing communication (from attackers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vignere Cipher

A

Key repeats itself (CryptoCrypto), To decrypt you subtract key from ciphertext (but breakable if you know the length of the key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is important about the property of XOR?

A

If you xor a random variable with a uniform independent random variable, you get a uniform random variable (creates randomness)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly