Topic 4 Flashcards

1
Q

The process of making and using codes to secure the transmission of information

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“Kryptos”

A

Cryptology

Comes from the greek word meaning hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“Graphein”

A

Comes from the greek word meaning write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code breaking

A

Basic Terms

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of obtaining the original message from the encrypted message

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Code designing

A

Basic Terms

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be used to check the integrity of a message: that the message has not been changed

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The secret key is shared between two parties

A

Private key cryptosystems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The secret key is not shared and two parties can still communicate using their public keys

A

Public key cryptosystems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1 key (private key)

A

Symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 keys (public and private key)

A

Asymmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Is a substitution cipher, named after Julius Caesar
  • Key = 3
  • Replaces each letter by the 3rd letter
A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Each letter is translated into the letter a fixed number of positions after it in the alphabet table

A

Caesar Cipher Operation principle:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

replaces one symbol with another

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • A message in its natural format readable by an attacker
  • Original message or data (also called cleartext
A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Message altered to be unreadable by anyone except the intended recipients

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transforming the plaintext under the control of the key

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sequence that controls the operation and behavior of the cryptographic algorithm

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transforming the ciphertext back to the original plaintext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Encrypts one fixed length group of bits at a time - SIZE is predetermined
  2. The block size is a fixed size - 64, 128, 256, 512, bit blocks
  3. Require padding to short blocks before encryption
  4. Used for symmetric encryption not asymmetric
A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Are fast and easy to implement in hardware
  2. Encryption is performed 1 bit or 1 byte at a time
  3. Mixes plaintext with key stream
  4. Either using Symmetric Key or Public Key
  5. The starting state should never be the same twice — uses initialization vector
A

Stream Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Are stronger but slower and often implemented in hardware
  2. One or large block at a time
  3. Substitution and transposition
A

Block Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Stream Ciphers
  2. Block Ciphers
A

Types of Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Electronic Codebook (ECB)
  2. Cipher Block Chaining (CBC)
  3. Counter (CTR)
A

Block Cipher Mode Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Key to ciphertext relationship is very complicated
  2. Key cannot be determined on the ciphertext
26
Q
  1. The simplest encryption mode
  2. Each block is encrypted with the same key—identical plaintext block created identical cipher block
A

Electronic Codebook (ECB)

27
Q
  1. Easy to implement
  2. Each plaintext block is XORed with the previous ciphertext block
  3. Adds additional randomization
  4. Uses initialization vector for the first block
A

Cipher Block Chaining (CBC)

28
Q
  1. Block cipher mode - acts like a stream cipher
  2. Encrypts using the values of the counter - 0, 1, 2 etc
  3. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block
A

Counter (CTR)

29
Q

Cryptology

Comes from the greek word meaning hidden

A

“Kryptos”

30
Q

What is Cryptography

Includes:

A
  1. Techniques for making sure that encrypted messages are not modified en route
  2. Techniques for secure identification/authentication of communication partners
31
Q

What is Cryptography

Refers to:

A
  1. The practice and study of encryption
  2. Transforming information in order to prevent unauthorized people from reading it
32
Q

Cryptanalysis

A

The process of obtaining the original message from the encrypted message

33
Q

Comes from the greek word meaning write

A

“Graphein”

34
Q

Cryptography

A

The process of making and using codes to secure the transmission of information

35
Q
  1. Output should be different from the input
  2. Change 1 bit of the input, at least 50% of the output should change
36
Q

Basic Terms

Cryptography

A

Code designing

37
Q

Basic Terms

Cryptanalysis

A

Code breaking

38
Q

Digest

A

can be used to check the integrity of a message: that the message has not been changed

39
Q

Private key cryptosystems/ciphers

A

The secret key is shared between two parties

40
Q

Public key cryptosystems/ciphers

A

The secret key is not shared and two parties can still communicate using their public keys

41
Q

Symmetric cipher

A

1 key (private key)

42
Q

Asymmetric cipher

A

2 keys (public and private key)

43
Q

Caesar Cipher

A
  • Is a substitution cipher, named after Julius Caesar
  • Key = 3
  • Replaces each letter by the 3rd letter
44
Q

Caesar Cipher Operation principle:

A

Each letter is translated into the letter a fixed number of positions after it in the alphabet table

45
Q

Substitution cipher

A

replaces one symbol with another

46
Q

Plaintext

A
  • A message in its natural format readable by an attacker
  • Original message or data (also called cleartext
47
Q

Ciphertext

A

Message altered to be unreadable by anyone except the intended recipients

48
Q

Encryption

A

Transforming the plaintext under the control of the key

49
Q

Key

A

Sequence that controls the operation and behavior of the cryptographic algorithm

50
Q

Decryption

A

Transforming the ciphertext back to the original plaintext

51
Q

Types of Cryptography

A
  1. Stream Ciphers
  2. Block Ciphers
52
Q

Stream Ciphers

A
  1. Are fast and easy to implement in hardware
  2. Encryption is performed 1 bit or 1 byte at a time
  3. Mixes plaintext with key stream
  4. Either using Symmetric Key or Public Key
  5. The starting state should never be the same twice — uses initialization vector
53
Q

Block Ciphers

A
  1. Are stronger but slower and often implemented in hardware
  2. One or large block at a time
  3. Substitution and transposition
54
Q

What is a Block Cipher?

A
  1. Encrypts one fixed length group of bits at a time - SIZE is predetermined
  2. The block size is a fixed size - 64, 128, 256, 512, bit blocks
  3. Require padding to short blocks before encryption
  4. Used for symmetric encryption not asymmetric
55
Q

Confusion

A
  1. Key to ciphertext relationship is very complicated
  2. Key cannot be determined on the ciphertext
56
Q

Diffusion

A
  1. Output should be different from the input
  2. Change 1 bit of the input, at least 50% of the output should change
57
Q

Block Cipher Mode Operations

A
  1. Electronic Codebook (ECB)
  2. Cipher Block Chaining (CBC)
  3. Counter (CTR)
58
Q

Electronic Codebook (ECB)

A
  1. The simplest encryption mode
  2. Each block is encrypted with the same key—identical plaintext block created identical cipher block
59
Q

Cipher Block Chaining (CBC)

A
  1. Easy to implement
  2. Each plaintext is block is XORed with the previous ciphertext block
  3. Adds additional randomization
  4. Uses initialization vector for the first block
60
Q

Counter (CTR)

A
  1. Block cipher mode - acts like a stream cipher
  2. Encrypts using the values of the counter - 0, 1, 2 etc
  3. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block