Lecture 4 - Cryptography Basics Flashcards
What are the ingredients of cryptography?
- plaintext (original text to be encrypted)
- encryption algorithm (substitution and transposition of plaintext)
- secret key (the input to the algorithm)
- ciphertext (algorithm output)
- Decryption algorithm (reverse of the encryption algorithm)
Classification of cryptography?
- type of operations used to transform plaintext to ciphertext (are we using substitution or transposition or both) -> information can’t be loss regardless!
- way of processing plaintext (block or stream)
- number of keys used (same or different)
What is the difference between block and stream when processing plaintext?
Block processes the input of one block of elements at a time, while Stream cipher processes the input elements continuously (one at a time).
What is it called when we are using one key for encryption?
Symmetric encryption
What is it called when we are using 2 keys for encryption?
Asymmetric encryption
What is symmetric encryption?
Both the sender and receiver have the same key, which can be used for decryption and encryption.
What is asymmetric encryption?
This is where the public key used for encryption is publicly available, while the private key is only available to the receiver. Sender encrypts using public, receiver decrypts with private.
What is a massive problem with asymmetric encryption?
encryption by private key can be decrypted with the public key, so avoid encrypting with private key as then everyone can decrypt