SON5 Flashcards
What is cryptography, and why is it important?
๐น Definition โ The art & science of securing communication from unauthorized access.
๐น Core Idea โ Uses encryption to protect confidentiality, integrity, and authenticity.
๐น Mnemonic โ Think of a locked diaryโonly someone with the key (encryption) can read it!
How does cryptanalysis differ from cryptography?
Definition โ The study of breaking codes and ciphers.
๐น Purpose โ Identifies weaknesses in cryptographic systems.
๐น Example โ Brute-force attacks and side-channel attacks.
๐น Mnemonic โ Think of a hacker cracking a secret code to reveal hidden messages!
What does cryptology include, and how is it different from cryptography?
๐น Cryptology = Cryptography + Cryptanalysis.
๐น Field of study โ Covers both creating and breaking encryption.
๐น Think of it as the umbrella term for everything encryption-related.
๐น Example โ A cybersecurity expert who both encrypts and tests security systems.
๐น Visualization โ A two-sided coin: one side encrypts, the other breaks encryption.
What is a cryptovariable, and why is it crucial in encryption?
๐น Definition โ Cryptographic keys, also called cryptovariables, are used for encryption & decryption.
๐น Importance โ Secure key management = stronger encryption.
๐น Example โ AES encryption relies on secret keys.
๐น Mnemonic โ The key to a treasure chestโwithout it, the gold (data) stays locked!
What are the four main goals of cryptography?
๐น Confidentiality โ Keeps data secret using encryption.
๐น Integrity โ Prevents unauthorized changes using hash functions.
๐น Authentication โ Verifies identity (e.g., digital certificates).
๐น Non-repudiation โ Prevents denial of actions (e.g., digital signatures).
Tip: Use the mnemonic C.I.A.N. โ Confidentiality, Integrity, Authentication, Non-repudiation!
How do cryptographic keys and algorithms work together?
๐น Keys โ Unique strings of bits that encrypt/decrypt data.
๐น Algorithms โ Lock that transforms data; keys act as the unlocking tool.
๐น Security Factor โ Stronger, longer, and random keys = better encryption.
๐น Key Management โ Even strong algorithms fail with weak or exposed keys.
(Tip: Think of a padlock and keyโthe lock (algorithm) stays the same, but different keys (cryptographic keys) control access!)
What does Kerckhoffsโs Principle say about cryptographic security?
๐น Definition โ A cryptosystem remains secure even if its design is public, as long as the key stays secret.
๐น Why it matters โ Security should rely on key secrecy, not algorithm secrecy.
๐น Real-world example โ Modern encryption (e.g., AES) is public, but its security depends on the key.
When should you use a block cipher, and how does it work?
๐น Encrypts data in fixed-size blocks (e.g., AES - 128-bit blocks).
๐น Best for large data processing (e.g., file encryption).
๐น Stronger but slower than stream ciphers.
(Tip: Think of a chessboardโeach piece (block) moves in a structured way! โ๏ธ)
What are stream ciphers used for, and why are they faster?
๐น Encrypts data one bit/byte at a time (e.g., RC4).
๐น Best for real-time data streams (e.g., voice calls, low-power devices).
๐น Faster but riskier if key reuse occurs.
(Tip: Think of a waterfallโdata flows continuously, and encryption happens in real time! ๐)
How does a substitution cipher work, and what is a common example?
๐น Replaces each letter with another letter/symbol (e.g., Caesar cipher shifts letters).
๐น Keeps letter order the same, but changes their identity.
๐น Easy to break with frequency analysis.
How does a transposition cipher work, and how is it different from a substitution cipher?
๐น Rearranges the letters in plaintext without changing them.
๐น Same letters, different order (e.g., Rail Fence Cipher).
๐น Stronger with complex patterns, but still breakable.
How does key stretching strengthen weak passwords?
๐น Definition โ Enhances weak passwords by making them harder to brute-force.
๐น How it works โ Repeatedly hashes a password with additional data (e.g., salt).
๐น Purpose โ Increases computation time, slowing down attackers.
๐น Examples โ PBKDF2, bcrypt, Argon2.
(Tip: Think of kneading doughโthe more you work it, the stronger it gets! ๐)
Why is key sharing a challenge in symmetric encryption?
๐น Same key for encryption & decryption โ Must be shared & kept secret.
๐น Key management is critical โ Secure distribution is a challenge.
๐น Risk โ If the key is exposed, all encrypted data is compromised.
(Tip: Think of a shared house keyโif someone steals it, they can unlock everything! ๐๐ )
Why is symmetric encryption faster than asymmetric encryption?
๐น Faster & more efficient than asymmetric encryption.
๐น Best for large data encryption (e.g., AES for file encryption).
๐น Uses simpler math operations, reducing processing time.
(Tip: Think of a fast ziplineโquick and direct, unlike the complex routes of asymmetric encryption! ๐)
Where is symmetric encryption commonly used?
๐น Used for:
Secure storage (encrypted files & databases).
Data in transit (VPNs, wireless networks).
Bulk encryption (fast and efficient for large data).
๐น Common Algorithms โ AES, DES, 3DES.
(Tip: Think of a locked vaultโgreat for storing & moving data securely! ๐)
Why is key management a challenge in symmetric encryption?
๐น Same key = Encryption & Decryption โ Must be securely shared & stored.
๐น Scalability issue โ Hard to manage in large networks.
๐น Risk โ If the key is leaked, all data is exposed.
(Tip: Think of a single master keyโif stolen, everything is compromised! ๐โ ๏ธ)
How does key length affect the security of symmetric encryption?
๐น Key length matters โ Longer keys = Stronger encryption.
๐น 128-bit, 256-bit AES โ Harder to brute-force.
๐น Algorithm security โ Must be well-tested & resistant to attacks.
(Tip: Think of a password length ruleโthe longer, the harder to crack! ๐๐ก)
Why is key distribution a major challenge in symmetric encryption?
๐น Same key for encryption & decryption โ Must be securely shared.
๐น Risk โ If intercepted, encrypted data is compromised.
๐น Key Exchange Problem โ Needs a secure method to distribute keys (e.g., pre-shared keys or key exchange protocols).
(Tip: Think of a secret letterโif the delivery is intercepted, the message is exposed! โ๏ธ๐)
Why does symmetric encryption struggle with scalability?
๐น More users = More keys โ Key growth is exponential.
๐น Formula โ N(Nโ1)/2 unique keys for N users.
๐น Problem โ Managing many keys becomes impractical in large networks.
(Tip: Imagine a group chat where every pair needs a secret passcodeโit quickly becomes overwhelming! ๐ฒ๐)
Why is secure key storage critical in symmetric encryption?
๐น Keys must be securely stored โ If stolen, data is exposed.
๐น More users = Harder key protection โ Large systems increase risk.
๐น Solution โ Use hardware security modules (HSMs) or encrypted storage.
(Tip: Think of a bank vault for keysโif someone steals the key, they unlock everything! ๐๐ฆ)
Why does symmetric encryption fail to provide non-repudiation?
๐น Same key for all users โ No way to track who encrypted/decrypted data.
๐น No proof of authorship โ Cannot verify which user performed an action.
๐น Alternative โ Asymmetric encryption (digital signatures) enables non-repudiation.
(Tip: Imagine a shared PIN codeโanyone can use it, but you canโt prove who did! ๐ข๐คทโโ๏ธ)
What are the key characteristics of DES encryption?
๐น 64-bit block cipher โ Encrypts data in fixed-size blocks.
๐น 56-bit effective key โ (64-bit key, but 8 bits used for parity).
๐น Uses XOR operations โ For encryption transformation.
๐น 16 rounds of processing โ Strengthens encryption but now considered weak.
(Tip: Think of a lock with 16 turnsโeach round strengthens encryption but can still be picked! ๐)
How does 3DES improve on DES, and why is it being phased out?
๐น Applies DES three times per block for stronger encryption.
๐น 64-bit block cipher โ Same block size as DES.
๐น Key sizes: 64-bit, 112-bit, or 168-bit (but effective strength ~111 bits).
๐น End-of-life โ No longer recommended, AES is the better replacement.
(Tip: Think of locking a box three timesโstronger than one lock, but outdated! ๐๐๐)
What improvements did IDEA bring over DES?
๐น Created to replace DES โ Addressed weak key length.
๐น 64-bit block cipher โ Encrypts data in fixed blocks.
๐น Key sizes: 64-bit or 128-bit, divided into 52 subkeys.
๐น Still secure, but replaced by AES in modern systems.
(Tip: Think of a more complex lock with more keysโharder to break! ๐๐)