Lecture 5: Classical Encryption Part 1 (introduction, transposition ciphers, simple substitution ciphers, Caesar cipher, random simple substitution cipher) Flashcards

1
Q

What are the two facets of cryptology?

A
  1. cryptography

2. cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cryptography?

A

study of designing cryptosystems

science of secret writing

transformations of data depending on a secret (key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cryptanalysis?

A

study of breaking cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cryptography used to provide?

A
  1. confidentiality

2. authentication (or integrity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is confidentiality in terms of cryptography?

A

key is needed to read mesage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authentication in terms of cryptography?

A

key is needed to write message (with digital signature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a cryptosystem consist of?

A
  1. Set of plaintexts (holding original message)
  2. Set of ciphertexts (holding encrypted message)
  3. Set of keys
  4. Function → encryption/encipherment → transforms plaintext into ciphertext
  5. Inverse function → decryption/decipherment → transforms ciphertext back into plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for ciphertext?

A

cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main characteristics of a symmetric key cipher?

A
  • Encryption and decryption keys knowing ONLY to sender & receiver
  • Secure channel for transmission of keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are main characteristics of an asymmetric key cipher?

A
  • Each participant has public key & private key

* Possibly working for both encryption of messages and creation of digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is another name for a symmetric key cipher?

A

secret key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is another name of an asymmetric key cipher?

A

public key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the notation for an encryption function for a symmetric encryption algorithm?

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the notation for an decryption function for a symmetric encryption algorithm?

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the notation for a message/plaintext for a symmetric encryption algorithm?

A

M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the notation for a cryptogram/ciphertext for a symmetric encryption algorithm?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the notation for a shared secret key for a symmetric encryption algorithm?

A

K

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is encryption denoted as for a symmetric encryption algorithm?

A

C = E(M,K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is decryption denoted as for a symmetric encryption algorithm?

A

M = D(C,K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some resources available to an adversary?

A
  • computational capability

* system inputs/outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What may the adversary’s goal be?

A
  • retrieving whole secret key
  • distinguishing two messages (e.g. YES and NO) → may want to send message rather than control system and this may be enough info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is exhaustive key search?

A

Try all possible keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can you prevent exhaustive key search?

A

No, so all cryptosystems must have enough keys to make search too difficult computationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is it possible that an adversary finds key without trying exhaustive key search?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Is it possible that an adversary breaks cryptosystem without finding key?
Yes, e.g. ciphertext may leak info about key
26
What is a minimum standard for a cryptosystem?
Prevention of exhaustive search
27
What is the ciphertext only attack?
attacker has access to ONLY intercepted ciphertexts
28
What is the known plaintext attack?
attacker knows a small amount of plaintexts and their corresponding ciphertexts
29
What is the chosen plaintext attack?
attacker can obtain ciphertext from some plaintext that it has selected (attack has “insider encryptor” available who helps trigger attack)
30
What is the chosen ciphertext attack?
attacker can obtain plaintext from some ciphertext that is has selected (attack has “inside decryptor” available who decrypts attacker’s chosen ciphertext)
31
When is a cryptosystem seen as highly insecure?
if it can be practically attacked using only intercepted ciphertexts
32
What attacks should a cryptosystem be secure against?
chosen plaintext and chosen ciphertext attacks
33
What sort of attack is practical for an attacker?
ciphertext attacks
34
What is Kerckhoffs’ Principle?
attacker has complete knowledge of ciphertext i.e. decryption key is only item unknown to attacker
35
What is using a secret, non-standard algorithm an example of?
security through obscurity => severe problems
36
What do statistical attacks depend on?
using redundancy of alphabet
37
What info helps in a statistical attack?
distribution of single letters, diagrams (double letters) and trigrams (triple letters)
38
What are the most frequent letters (including space) in English (top 3)?
space E N
39
What are the most frequent digrams in English?
E + space | space + A
40
In terms of transposition ciphers, what two operations do historical ciphers combine?
transposition | substitution
41
Define the transposition operation
characters in plaintext mixed up with each other (permuted) → limited to plaintext’s alphabet
42
Define the substitution operation
each character (resp. set of characters) replaced by different character
43
Explain how transposition ciphers work
* Permuting characters in fixed period d and permutation f * Plaintext seen as a matrix of rows of length d * Permuting rows/cols and outputting in row/col order * E.g. permutation of rows and outputting in column order * Number off cols in random order → x cols have x! possible keys https://www.youtube.com/watch?v=sHsnH1u03e4
44
Explain simple transposition cipher
* Key → (d,f) * Each block of d characters is re-ordered using permutation f * d! permutations of length d → d x (d - 1) x (d-2) x … x 2 x 1 → take ball without replacement i.e. one less permutation choice
45
How can we identify a transposition cipher?
Frequency distribution of ciphertext = frequency distribution of plaintext characters
46
Can we solve transposition ciphers by hand if d is small? If so, how?
Yes, using anagramming
47
What is anagramming?
restoring disarranged characters to original position
48
How can you optimize the trials for attempting to solve a transposition cipher?
Knowledge of plaintext language diagrams and trigrams
49
How can we speed up the process of solving a transposition cipher?
automate the process
50
Compare the permutation done in a transposition and substitution cipher
Transposition ciphers permutes PLAINTEXT chars while substitution ciphers permute ALPHABET chars
51
What is the general idea of a simple substitution cipher?
each char in plaintext alphabet replaced b character in ciphertext alphabet following substitution table
52
What is a simple substitution cipher also called?
monoalphabetic substitution cipher
53
Explain the Caesar cipher
Moving ith letter of alphabet to (i+j)th letter s.t.c key is j → every char moved by j positions to right
54
What is the encryption function for the caesar cipher?
Ci = (Mi + j) mod n
55
What is the decryption function for the caesar cipher?
Mi = (Ci - j) mod n
56
What is n in the caesar cipher?
Either n = 26 or n = 27 (includes space) → size of alphabet
57
How do you perform cryptanalysis on caesar cipher?
Finding where one of the most frequent chars is shifted to --> count freqs --> trial mapping
58
Explain how the random simple substitution cipher works
Assigning random char of alphabet to another char in alphabet
59
How are encryption and decryption defined as for random substitution cipher?
defined by substitution table that randomly permutes alphabet
60
How many keys if random substitution cipher alphabet has 26 chars?
26! keys | if say A=C, then can’t assign A again → selection without replacement
61
What is caesar cipher a special case of?
substitution cipher
62
Can you do frequency analysis for random substitution cipher?
Yes, but solving by hand is tedious → many trials and errors