P2L5: Intro To Cryptography Flashcards
What is Ciphertext?
Ciphertext is plaintext that has been encrypted
What other services does Encryption/Decryption provide?
* Integrity checking (no tampering) * Authenticity (verified authorship) * Authentication (not an imposter)
Most protocols use Symmetric ciphers and Asymmetric Ciphers (True or False)
True
What are Asymmetric ciphers used for?
Authentication, key exchange and digital signatures
What are Symmetric ciphers used for?
Encryption of data/traffic
What types of attack methods exist related to Encryption/Decryption?
* Brute force - trying all possibilities * Cryptanalysis - analysis of algorithm and data characteristics used to decode a message * Implementation attacks - side channel analysis * Social Engineering attacks - the easiest way to get into a system
If the only form of an attack against encryption was brute force, then the solution would be to do what?
Use a longer key length so they just can’t find it in a reasonable amount of time
What is another name for the Caesar Cipher?
Shift Cipher
What is a Caesar cipher called when each letter isn’t shifted a specific amount but is instead mapped arbitrarily?
Mono-alphabetic cipher
What is the Vigenere cipher?
A matrix-like cipher.
What weaknesses exist for the Vigenere cipher?
It uses repeating letters and the length of the key can be determined using frequency analysis
What is Kerckhoff’s principle?
- A cryptosystem should be secure even if the attacker knows all the details about the system with exception of the secret key
- AKA “obscurity shouldn’t be used for security”
What types of ciphers should you use in real life based on the Kerckhoff principle?
Only use widely known ciphers that have been crypto analyzed for many years
What are the different types of Cryptography?
- Secret Key - ONE Key is used for encryption/decryption
- Public Key - TWO Keys are used
- Public for encryption & verification
- Private for decryption & signing
- Hash functions - easy to compute and infeasible to crack (weak collision resistant property)
What is the one-way property of a hash function?
It’s easy to compute the hash, but computably infeasible to crack it