Misc Flashcards
Modular inverse e.g 3^(-1) mod 7 means solving…
3 • x == 1 mod 7
Euler phi function phi(n) counts …
Number of integers between 1 and n that are relatively prime to n.
Chinese remainder theorem can be used to solve…
System of congruences with different moduli
Substitution cipher is vulnerable to …
- Frequency analysis attack (analysis of frequency of characters in ciphertext and matching to known letter frequency)
- Known plaintext attack (if the attacker knows part of plaintext e.g ‘May this email find you well’)
- Chosen ciphertext attack (same as known, achieved through social engineering)
Shift cipher is most vulnerable to…
Brute force (exhaustive search) because of very small key space
In a One-Time pad, the key must be at least as long as the message.
True
4 goals of cryptography
- Confidentiality (data only to authorized users)
- Integrity (guarantee that data is untampered during transmission/storage)
- Authentication (sender/receiver are who they claim to be)
- Non-repudiation (prevents denial of involvement in transaction with proof of origin or receipt that cannot be disputed, forced accountability)
Passive attacker threatens which goal?
Confidentiality
Active attacker threatens which goal?
All of them
What are pros and cons of symmetric key cryptosystems?
Pro: very fast
Cons: key management (ever user pair needs key O(n^2)
What is Kerckhoff’s Principle?
Security should only depend on the key itself. Assume attacker knows what algorithm is being used.
What is Square and Multiply used for?
Solve a^b mod n for a large exponent b
What is the concept of diffusion?
One character change in plaintext should affect as much ciphertext characters as possible
What is the concept of confusion?
The key/plaintext shouldn’t relate to ciphertext in a simple way
An affine cipher can be broken with 2 plaintexts.
True
Solving -21 mod 26 means…
Adding 26 to -21 until we get a positive result [0, 25]