Week 3 Flashcards

1
Q

What is the difference between Cryptography and Stenography?

A

Cryptography = Secret Writing

Stenography = Concealed Writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptanalysis?

A

Secret Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is difference between Symmetic and Asymmetric Encryption?

A

Symmetric = Single key to encrypt and decrypt, key1 = key2

Asymmetric = 2 Keys, one for encryption, one for decryption

Private key for decryption

Public key for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Mono-Alphabetic Cipher?

A

Each letter in the plaintext is replaced with a different one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Key Space mean?

A

the set of all valid, possible, distinct keys of a given cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Frequency Analysis?

A

Frequency analysis is used to break classical ciphers by studying the frequency of letters in a ciphertext

For example, in English, the most common letters are E, T, A, and O, while Z, Q, X, and J are rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Polyalphabetic Cipher?

A

Uses multiple substitution alphabets

Each letter could be encryped differently by position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a Polyalphabetic Cipher?

A

Vigenère cipher

Which shifts letters by varying amounts using a key word

eg. using word “CAT” as key

GOOD MORNING

IOHF MHTNBPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a One-Time Pad (OTP)?

A

Thereotically 100% secure

Uses random key same length as message

Each bit encrypted with corresponding pad using XOR

Key must remain secret and be destroyed after use

Must ensure randomness in key generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Security like for Substitution Ciphers?

A

Huge key space of 26!

Brute forcing a key is difficult

However it is very easy to crack using Frequency Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the Vigenere Cipher work?

A

The Vigenère Cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword.

It is often referred to as a polyalphabetic cipher because it uses multiple cipher alphabets to encrypt the message, making it more secure than a simple Caesar cipher, which uses just one shift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Transposition (Permutation) Cipher?

A

Rearranges character positions

Wrap the ciphertext (encrypted) around a cylinder to spell out its decrypted message on the face of the cylinder

The shared secret is the diameter of the cylinder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Composite Cipher?

A

Combines substitution and transposition ciphers

S-Boxes - Confuse input bits

P-Boxes - Diffuse bits across S-box inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was the First Cryptographic Standard?

A

16 round Feistal Cipher and a key-scheduler

Block cipher, encrypting 64-bit blocks

First Cryptographic standard:

US federal standard in 1977

Heavily used in banking

Extended to triple-DES to overcome the key-length problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How was the Security of DES?

A

Main attack: exhaustive search

7 hours with 1 million dollar computer (in 1993)

7 days with $10,000 FPGA-based machine (in 2006)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A