Lesson 5 - Summarizing Basic Cryptographic Concepts Flashcards
The science and practice of altering data to make it unintelligible to unauthorized parties.
Cryptography
Unencrypted data that is meant to be encrypted before it is transmitted, or the result of decryption of encrypted data.
Plaintext
Data that has been enciphered and cannot be read without the cipher key.
Ciphertext
Data that has been enciphered and cannot be read without the cipher key.
Cipher
The science, art, and practice of breaking codes and ciphers.
Cryptoanalysis
There are three main types of cryptographic algorithm with different roles to play in the assurance of the security properties.
confidentiality, integrity, availability, and non-repudiation
These types are hashing algorithms and two types of encryption ciphers.
symmetric and asymmetric
A function that converts an arbitrary length string input to a fixed length string output. A cryptographic hash function does this in a way that reduces the chance of collisions, where two different inputs produce the same output.
Hashing
The output of a hash function.
Checksum
A form of hashing algorithm used to prove integrity.
Hashing algorithm
A cryptographic hashing algorithm created to address possible weaknesses in MDA. The current version is SHA-2. The most popular variant is SHA-256, which produces a 256-bit digest.
Secure Hash Algorithm
A cryptographic hash function producing a 128-bit output.
Message Digest Algorithm
FCIV
File Check Integrity Version
In cryptography, a specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption.
digest
Involves replacing units (a letter or blocks of letters) in the plaintext with different ciphertext.
Substitution ciphers
A two-way encryption scheme in which encryption and decryption are both performed by the same key. Also known as shared-key encryption.
Symmetric encryption
Symmetric encryption is also referred to as single key or private key or shared secret.
Symmetric encryption is very fast.
It is used for bulk encryption of large amounts of data.
Symmetric encryption is used for confidentiality and cannot be used for authentication or integrity.
Example: AES
Two types of symmetric encryption.
stream cipher and block cipher
A type of symmetric encryption that combines a stream of plaintext bits or bytes with a pseudorandom stream initialized by a secret key.
Stream cipher
Counter (CTR) and Galois/Counter Mode (GCM) modes allow block ciphers to behave like stream ciphers.
https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
A type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers.
Block cipher
A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
Advanced Encryption Standard (AES)
The range of key values available to use with a particular cipher.
Keyspace
“Key Length” - Using a longer key (256 bits rather than 128 bits, for instance) makes the encryption scheme stronger.
In which encryption cipher is operations performed by two different but related public and private keys in a key pair.
A cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) algorithms, but the private key is not derivable from the public one.
Asymmetric encryption.
An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example.
Each key is capable of reversing the operation of its pair.
Referred to as public key cryptography.
In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with which the holder wants to communicate securely. A private key can be used to encrypt data that can be decrypted by the linked public key or vice versa.
private key
During asymmetric encryption, this key is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.
public key
The public key cannot be used to decrypt the ciphertext, even though it was used to encrypt it.
Named for its designers, Ronald Rivest, Adi Shamir, and Len Adelman, the first successful algorithm for public key encryption with a variable key length and block size.
RSA Algorithm
RSA key pair security depends on the difficulty of finding the prime factors of very large integers (modular exponentiation).