Lecture 4 Flashcards

1
Q

What is Cryptography?

A

Keeping messages secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Decryption?

A

Transformingencrypted messages back to its original form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptosystem?

A

A system that combines both encryption and **deencryption **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wjhat is Cryptanalysis?

A

Breaking the cryptosystems (used by hackers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Plaintext?

A

Unencrypted “meaningfultext into a certain language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Ciphertext?

A

Any encrypted text in the given language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Polyalphabetic Cipher?

A

Where plaintext characters are mapped onto several possible characters in the cipher text depending on the position of the input character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Transposition Cipher?

A
  • Block ciphers
  • Designed to conceal a message content by rearranging its characters, rather than alphabet either within or across the blocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalysis Techniques & Tools

A

A Cryptanalysis works with:

  • Encrypted messages
  • Intercepted plaintext
  • Known encryption algorithms
  • Data items suspected to be in cipher text

A Cryptanalyst tools include:

  • Mathematical and statistical techniques
  • Computers with plenty of processing power
  • Statistical properties of language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the modern Cryptography?

A
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Symmetric Key?

A

Known as “conventional key” or “secret key” =

SECRET COMMUNICATION
Technique to provide confidentiality, transmitted and stored data

  • Used to encrypt and decrypt message
  • Send and receiver of the message share a single and common key used to encrypt and decrypt a message
  • If someone discovers the key, the plain text is readable
  • Simple and faster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantages of Symmetric Key

A

Two parties must:

  • Obtain copies of the secret key
  • exchange the key in a secure way
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Five ingredients to Symmetric Encryption

A
  1. Plain text: original data that is placed into the algorithm
  2. Encryption algorithm: performs substitutions and transformation performed by the algorithm depending on the key
  3. Secret key: The secret key is placed in the encryption algorithm which performs transformation depending on the key
  4. Ciphertext: Scrambled text to produce an output; depending on the plaintext and secret key. Two different key will produce two different ciphertext.
  5. Decryption algorithm: Ciphertext and secret key to transform back to plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Encryption – What is Block VS Stream

A

Block Cipher

  • are most commonly used in symmetric encryption algorithms
  • Processes plain text into fixed-size blocks, then a block -> cipher text, equal size for each plain text block
  • Reusable keys

Examples: DES (Data Encryption Standards), 3DES (Triple Data Standards) and AES (Advances Encryption Standards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stream Ciphers

A
  • Input element continuously
  • Produces one element a time
  • Encrypts one byte (8bits) a time from small to large chunks a time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptanalysis attacks rely on

A
  • Nature of the algorithm
  • Some knowledge of general characteristics of plaintext
  • Plain-cypher text pairs
17
Q

Brute-Force Attack

A

Tries all possible keys on some ciphertext until an intelligible translation into plaintext is **obtained **

18
Q

Data Encryption Standard (DES) and concerns

A
  • Most widely used in encryption scheme
  • FIPS PUB 4.0
  • Known as Data Encryption Algorithm
  • Uses 64bits of plaintext block and 56 key to produce a 64bit cipher text block

Concerns:

  • The algorithm
  • The use of 56bit key
19
Q

Triple DES (3DES)

A
  1. A mode for DES encryption algorithm that encrtypts data 3 times using 2/3 unique keys
  • 168 bit key that prevents the brute-force attack of DES
  • Uses 64 bit block sizes for efficiency and security
20
Q

Advanced Encryption Standard

A
  • 128-bit symmetric block data encryption technique
  • Should have a security strength that is better than 3DES