MTA T215B Flashcards
Define Anonymity
we might want some actions to be 🔴untraceable🔴 to us as specific.
Define Control of personal data
✅ We want the 🟢right🟢 to control our personal data.
Electronic Codebook (ECB):
✅independent encryption approach
📌each block is encrypted independently 🆓 of any other,
🔑The same key will be used for each block.
🔴 Drawbacks of ECB:
- Two similar plaintext blocks ➡️ Similar ciphertext blocks. 📑📑
Fixed ciphertext positions ➡️⚠️Vulnerability. 🔓 - Not practical for long repetitive stings of 1s and 0s . 🔁 ❌
explain the term “Surveillance”
a purposeful , routine , systematic , and focused attention paid to personal detail, for the sake of control , entitlement , management , influence , or protection 🛡️.
Mention two benefits that can be drawn from surveillance.
- 📊 Progress towards efficient administration ⚙️.
- 💰 Development of Western capitalism 💵 and the modern nation-state 🏛️.
- 🦾 Reduce labor intensity 💪, increase reliability ✅, and enhance work volume 📈.
three features of surveillance
🔹 1️. Citizens Under Surveillance.
✅ Citizens in public spaces are monitored, reducing their “public privacy.”
🔹 2️. No Choice for Citizens.
✅ Citizens cannot agree or reject surveillance; they have no control
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being purposeful?
Aim for road safety, crime reduction, and national security,
“e.g., speed cameras helping control traffic”🚦
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Routine?
Happens daily during driving, public presence, internet usage.🚗🌍
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Systematic ?
It targets specific groups like drivers, people in designated areas, internet users, making it structured and organized. 👥
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Focused ?
It collects data on identifiable individuals, but accuracy varies:
speed cameras capturing vehicle data rather than identifying the driver directly.🎯
forms of privacy can potentially clash with a number of values.
Mention three of these factors.
🛑 Security & Accountability 🛑
Accountability → for personal or official actions.
Security → Crime prevention & detection.
Legal Standards → Laws may limit choices.
⚡ Convenience & Services ⚡
Efficiency, convenience → Faster access to services.
Service Access → Requires specific criteria.
Health Monitoring → Tracking health risks.
Define singularities and discuss how these singularities are classified
🔹 Singularities
📌 regions where ridge lines form high-curvature shapes.
✅ Three main types: loop - delta - whorl.
From your study of fingerprint recognition,
mention three types of fingerprint minutiae
▪ Termination النهاية
▪ Lake البحيرة
▪ Island or point الجزيرة أو النقطة
▪ Spur and crossover. الشوكة والتقاطع
define the term “biometric” and explain its two main types.
In your explanation, provide one example for each one of these types.
Biometric
Measurement of human characteristics used for identification in authentication.
Divided into two types:
- Physiological → Fingerprint, iris pattern 👀 🖐️.
- Behavioral → Gait or Signature 🚶♂️.
Discuss Gait recognition
How a person walks (Behavioral Biometric) 🚶♂️.
✅ Advantages:
- Captured from a distance 📏
- Detected without subject’s awareness 🎥
❌ Disadvantages:
* Difficult to capture (needs video analysis) 🎞️
* Computationally expensive (not suitable for real-time) 🖥️
Discuss Typing pattern recognition.
How a person types on a keyboard (Behavioral Biometric).
including the pressure applied to each key and the intervals between key taps.
✅ Advantages:
* It has the potential to replace signatures in computer-based activities. ✍️
* not require user cooperation, computer can automatically capture it at login. 🤖
❌ Disadvantage:
* Still under development🛠️
Define ridge configurations and state the three different levels of ridge configurations
the way ridge lines, and the valleys are arranged in a fingerprint. 🖐️✨
− 🌍 Global Level
− 📍 Local Level
− 🔬 Micro levels
From your study of “Biometrics”, you have seen that turning a raw fingerprint image into a set of minutiae usually requires three main stages of processing. Explain briefly these stages.
- Binarisation (تحويل للونين فقط) 🖤 🔄
Converting the greyscale raw fingerprint image into a black and white “binary image”. Where the appropriateness of the threshold is crucial. - Thinning (التنحيف) 📏
Reduces the width of each ridge to one pixel. - Minutiae Detection (اكتشاف التفاصيل الدقيقة) 🔍
Runs a 3×3-pixel window over the thinned fingerprint image to detect black pixels.
Biometrics is designated by a set of characteristics. Among these characteristics are the “Distinctiveness” and “Acceptability”. Describe these two characteristics.
- Distinctiveness:
Indicates how well the biometric separate one individual from another. - Acceptability:
Indicates the degree of acceptance of the biometric by the user.
In the context of Biometrics, discuss the difference between
identification and authentication
Authentication systems
Confirming whether an individual is who he or she claims to be.
It is therefore a one-to-one comparison process.
Identification systems
Identifying one individual from a population of individuals.
It is therefore a one-to-many comparison process.
define Number factorization
All numbers can be decomposed into two or more numbers
that multiply together to make the number.
define Prime factorization
Prime factorization when all the factors are prime numbers.
define Prime number
Prime numbers have only two factors: 1 and itself.
define Compound number
Compound numbers have always more than two factors: 1, itself, and other factors.
Define the term “Encryption”
information is changed in some systematic way🔒
to hide its content from everyone except its intended recipient.
Define the term “Cryptology”.
The branch of science concerned with the concealment of information 📚
Discuss the difference between Cryptography and Cryptanalysis
🔹 Cryptography 🛠️: The science of creating codes and ciphers.
🔹 Cryptanalysis 🔓: The science of breaking them.
the “linguistic analysis”. In this context, explain this approach and provide two examples to illustrate the idea.
Identifies linguistics pattern in plaintext for textual context
All languages have unique patterns.
✅ ‘Q’ is almost always followed by ‘U’ .
✅ Frequent letter pairs (Digraphs): ‘th’, ‘ea’, ‘of’, ‘st’
✅ Common repeated letters: ‘ee’, ‘oo’, ‘tt’.
In Cryptography. “codes” and “ciphers: have different have meanings.
From your study, discuss the difference between them.
🔹 Codes: 📝⛓️ الأكواد
✔ Replace words or phrases with alternative symbols (code words).
✔ Not always for secrecy, sometimes used as abbreviations or alternative communication.
✔ Relies on codebooks for encoding and decoding.
🔹 Ciphers: 🔐 الشفرات
✔ Used for encryption by substituting or rearranging symbols.
✔ Follows systematic rules (structured encryption process).
✔ Always used for secrecy and security.
explain the operation of “Stream ciphers” (encryption and decryption).
🔹 1. Encryption: 🔐
📌 💻 Stream ciphers encrypt small data segments (bit-by-bit).
✅ Key Features:
* Encrypt on-the-fly (during transmission).
* Uses a short key (“seed”) to generate a long, random key stream.
* 🔑 Combines the key stream with plain text using XOR to create ciphertext.
🔹2. Decryption: 🔓
📌 The decryption process mirrors encryption.
✅ Key Features:
* Uses the same key stream for decryption “on the fly”.
* 🔄 Must be synchronized between sender & receiver.
* Ensures each bit or byte is decrypted using the same key.
Advantages over the block cipher: 🚀
✅ ⏳ Faster than block ciphers.
✅ Less complex and easier to implement in hardware.
Common applications: 📡
✔ when input stream length is unpredictable (e.g., telecommunications).
✔ when input buffering is limited.