P2L5 Intro to Cryptograph Flashcards
1
Q
Attacks on Encryption
A
- Brute-force attack (try all keys)
- Crypto-analysis - analyze algorithms and data
- Implementation attack - side channel analysis, example observer power consumption of crypto system to determine value
- social engineering
2
Q
Encryption
A
One-to-one mapping which creates cipher
3
Q
What should be kept secret?
A
Encryption key
4
Q
Types of Cryptography
A
Secret Key (one key for encrypt/decrypt) Public Key(two keys, public for encryption, private for decryption. Also use for signing. Hash Function - data of any size transformed to fixed length output (128-512 bits)
5
Q
Hash Function Features
A
Easy to compute H(m)
H(m), no easy way to find m
one-way function
Given m1, it is computationally infeasible to find m2!=m1 such that H(m1)=H(m2) (weak collision resistant)
Or
Computational infeasible to find m1!=m2 s.t. H(m1) = H(m2)
(strong collision resistant)