Security & crytography Flashcards
What is the difference between symmetric and asymmetric encryption
Symmetric encryption uses the same key to encrypt and decrypt
Asymmetric encryption uses different keys to encrypt and decrypt
What does AES stand for ?
Advanced Encryption Standard
What does ECB stand for ?
Electronic Code Book
Describe the steps in ecb mode ?
1.) Convert your plaintext to binary
2.) Convert your key to binary
3.) XOR your values in steps 1 and 2
4.) Convert your output in step 3 into hex
5.) Put your hex value from the previous stage into your given substitution box
6. ) Convert your hex value form the substitution and convert it to binary
7.) Put your binary from the previous step into a permutation box (this is you final answer)
8.) Convert your final answer to correct type( hex, decimal or binary)
Describe the steps in cbc mode ?
1.) Convert your initialisation vector to binary
2.) Convert your plaintext to binary
3.) XOR your values in steps 1 and 2 (remember the value after the xor)
4.) Convert your key to binary
5.) XOR your values in step 3 and 4
6.) Convert your output in step 5 into hex
7.) Put your hex value from the previous stage into your given substitution box
8. ) Convert your hex value form the substitution and convert it to binary
9.) Put your binary from the previous step into a permutation box (this is you final answer)
10.) Convert your final answer to correct type( hex, decimal or binary)
Name some modern applications of cryptography
- Online Banking
- Secure Remote Access(Moodle from home
- Cryptocurrency
- Cloud Storage Security
- E-commerce
- Messaging
What is cryptography
- Cryptography is the practice evaluation, and analysis of approaches and techniques to establish security services, such as confidentiality, integrity and authenticity within communication environment to establish data security
Should we use untested crypto systems
No
What is a key in cryptography
Key is a means to safeguard data
Define cryptoanalysis
the study of complex statistical and mathematical techniques to obtain meaningful information about the ciphertext or encrypted message
What is Kirchhoff’s principle
A cryptosystem should preserve its security properties even if everything about the cryptosystem, such as, encryption and decryption algorithms are made public, provided the secret key is kept securely
What are the 5 tuples of cryptosystems
E = Encryption
D = Decryption
M = letter in plaintext
K =Key
C = Ciphertext
What is another name for substitution cipher
monoalphabetic substitution
A simple mono-alphabetic substitution cipher has how many possible keys?
26!
How does substitution cipher work?
It involves one-to-one mapping of the plaintext letter by a fixed ciphertext letter.
What are some drawbacks of substitution cipher?
- This cipher is not secure because its prone to brute force attack(exhaustive key search)
- Cipher text is also prone to letter frequency analysis
Name a type of substitution cipher
Caeser cipher
What happens in Caeser cipher
Every character is replaced with the character three (k) slots to the right
What are the caesar cipher formula
- Encryption c = e^k (m) = m + k mod 26
- Decryption m = d^k (c) = c - k mod 26
What are some drawbacks of caesar cipher
Prone to brute force / exhaustive search because there are only 26 keys.
Prone to letter frequency analysis
Describe how dictionary attack works
. You get some words then:
○ First letter in word becomes A
○ Second letter becomes B and etc
○ Letter repeated occurrences in the plaintext use the same letter
Describe a benefit of dictionary attack
Allows us to perform decryption faster on ciphertext produced from substitution cipher
Describe some weaknesses of dictionary attacks
- Different words can have the same pattern
To avoid this use dictionary on longer words so you can avoid getting the same pattern
What is another name for vigenere cipher
Polyalphabetic cipher