Lecture 1 & 2 Flashcards
What does Encryption achieve?
Makes data incomprehensible to preserve its confidentiality
What is a cipher?
The algorithm used by encryption when encrypting data
What is meant by Pre-Image resistance in Cryptographic Hash Functions?
If given the output of a hashfunction, is should be very hard to find the input of the hashfunction. Given a hash h, it should be hard to find m such that
h = H(m)
what is a adversary model?
Is a generalization of any attack(er) with specific capabilities and computational power
what is a threat model?
What adversaries and properties to care about
What does the Kerckhoff’s Principle state?
“A cryptosystem should be secure even if everything is known about the system / scheme except for the key.”
What is something if it is computationally secure?
To attempt to solve by bruteforcing is impossible
What is meant by Second Pre-Image resistance in Cryptographic Hash Functions?
If a input message is given, and creates a hash, it should be very hard to find another input message that gives the same hash. Given input m1, it should be hard to find a distinct m2 such
that H(m1) = H(m2), they yield the same output
What is cryptology?
The study of how to hide messages or how to secure communication against adversaries
Cryptology can be defined in two parts. What are these parts, and what do they imply?
Cryptography – How to construct cryptographic systems
Cryptanalysis – How to break cryptographic systems
What is meant by Collision resistance in Cryptographic Hash Functions?
It should be hard to find any two distinct m1 and m2 such
that H(m1) = H(m2). Attacker is not given a message m1 or m2.
There are two types of security, what are these types and what do they imply?
Unconditional – Information-theoretically secure (impossible to break – impractical)
Computational – Broken with enough computation, but not within “reasonable” time
Symmetric encryption keys are between what size (in bits)? For example, between 1-2.
128 - 256 bits
Describe Symmetric Encryption
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.
What is the avalanche effect?
Small change in input, large change in output in hash function