NWEN - Revision Flashcards

1
Q

Name Three Crypt Analysis Techniques

A
  1. Brute Force
  2. Frequency Analysis
  3. Relationship Analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Polyalphabetic Cipher work

A

Uses more than one alphabet for the encryption and decryption process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how relationship analysis works

A

Adjacent letters in some languages may have certain personality traits. E.g. ‘Q’ is most likely always followed by a ‘U’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you break the Polyalphabetic Cipher

A
  1. Determine key length (X)
  2. Split into X seperate cipher texts
  3. Apply frequency analysis
  4. Recombine results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name a way to make it harder to crack the Polyalphabetic Cipher

A

Change the pattern the cipher uses for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Breaking Vigenere Cipher

A

You only care about the length of the keyword used. Finding the correct word length allows you to split the text into separate texts which can then have frequency analysis performed to break the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Estimating key length of Vigenere

A

Must estimate based on any repeated sequences that can be viewed. More specifically the distance between repeated patterns that can be viewed helps estimate the length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain One-Time Pad Key Length

A

Must have the same number of bits as the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the operation performed for One-Time Pad

A

Exclusive or (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Polyalphabetic Cipher’s main purpose

A

To decrease the footprint left by a language used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is impractical about One-Time Pad

A

Long messages need an equally long key and so may prove to be impractical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the two types or classes of symmetric encryption techniques

A
  1. Stream Cipher (One time pad)

2. Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the two block cipher main operations

A
  1. S-Box (substitution mapping on n bit input to n bit output)
  2. P-Box (permutation taking in a number of bits and rearranging them)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two main approaches of Cryptography

A
  1. Substitution
  2. Transposition
    Block cipher uses both
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block cipher aim

A

For every bit of input to effect every bit within the output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are multiple S-boxes used

A

To try and decrease the overall complexity. S boxes for N inputs can have 2^n outputs, which can get very large very quickly. `

17
Q

What condition must be satisfied by P-Box

A

Must be reversible. And so uses XOR to perform the scrambling operation

18
Q

What is an issue with Block Ciphers

A

The same plaintext input produces the same output (which can in turn be used to break the encryption).

19
Q

How to overcome Block Cipher limitations

A

Perform XOR and use a random key to encrypt the messages as well. Random key is derived through the use of CBC.