Symmetric Cryptography - Confusion / Diffusion etc ... Flashcards

1
Q

attempt to remove letter frequency characteristics in plain text from appearing in ciphertext, done by substitution.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

change to one character in plaintext affects multiple characters in ciphertext, done by transposition.

When done confusion/diffusion creates Avalance which means small changes in input results in large effects in output.

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(1) synchronous is what type of cipher ?

(2) asynchronous is what type of cipher ?

A

(1) Stream Cipher / (2) Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? science of transforming info into unitelligible form.

??? study of both cryptography and cryptanalysis.

??? all parts that make up system to carry out encrypt/decypt process. PGP, PKI

A

Cryptography / Cryptology / Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

study of finding weaknesses in ciphers.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? method used to encode characters to hide their value.

??? process of decrypting encrypted text.

A

Cipher / Decipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

instance when 2 different keys generate same cipher text.

A

key clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

can also be called -> secret key, private key, shared key, same key, single key, session key; best for bulk encryption, both parties share the same key.

A

Symmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages : exchanging of shared secret key, trust between parties sharing the key, management of keys -> n(n-1)/2, no authentication or non-repudiation.

Advantages : less computationally intensive, produces smaller file size, allows for faster transmissions.

A

ADV / DISADV of Symmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

entire key space should be used, random key generation should be used (IV), strong keys should be used, keys should be longer than the message, key management and security should be in place.

A

Symmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly