Shared Flashcard Set

Details

Cryptography
everything you need to know
42
Other
Post-Graduate
04/04/2016

Additional Other Flashcards

 


 

Cards

Term
What Is Cryptography?
Definition
The word cryptography comes from two Greek words meaning “secret writing” and is the art and science of concealing meaning.
Term
What is Cryptanalysis ?
Definition
Cryptanalysis is the breaking of codes
Term
What are the basic components of cryptography?
Definition
The basic component of cryptography is a cryptosystem.
Term
What is a cryptosystem?
Definition

A cryptosystem is a 5-tuple (E, D, M, K, C), where

......

M is the set of plaintexts,

K the set of keys

C is the set of ciphertexts


E: M × KC is the set of enciphering functions, and


D: C × KM is the set of deciphering functions.

Term
What is the Goal of Cryptography?
Definition

 

To keep enciphered information secret

Term
What are 3 types of cryptographic attacks?
Definition
  1. In a ciphertext only attack, the adversary has only the ciphertext. Her goal is to find the corresponding plaintext. If possible, she may try to find the key, too.
  2. In a known plaintext attack, the adversary has the ciphertext and the plaintext that was enciphered. Her goal is to find the key that was used.
  3. In a chosen plaintext attack, the adversary may ask that specific plaintexts be enciphered. She is given the corresponding ciphertexts. Her goal is to find the key that was used.
Term
A good cryptosystem protects against what three types of attacks?
Definition

chosen plaintext attack

 

known plaintext attack

 

ciphertext only attack

 

Note: Attacks use both mathematics and statistics

Term
Classical Cryptosystems
Definition

Are also called "single-key or symmetric" cryptosystems

 

-use the same key for encipherment and decipherment

Term
What are two basic types of classical ciphers?
Definition
transposition ciphers and substitution ciphers
Term
What is a transposition cipher?
Definition

It rearranges the characters in the plaintext to form the ciphertext

 

Note: The letters are "not" changed.

Term
What is the weakness inherent in Transposition Ciphers?
Definition

 

Mathematically, the key to a transposition cipher is a permutation function. Because the permutation does not alter the frequency of plaintext characters, a transposition cipher can be detected by comparing character frequencies with a model of the language.

Term
What is a required to effectively attack a Transposition Cipher?
Definition
Attacking a transposition cipher requires rearrangement of the letters of the ciphertext. thru a process called anagramming
Term
What is a substitution cipher?
Definition
It changes characters in the plaintext to produce the ciphertext.
Term
What type of attack is the Caesar Cipher susceptible?
Definition
A  statistical ciphertext-only attack
Term
What is Vigenère Cipher?
Definition

Vigenère cipher chooses a sequence of keys, represented by a string.

 

The key letters are applied to successive plaintext characters, and when the end of the key is reached, the key starts over. The length of the key is called the period of the cipher

Term
What type of cipher is the Vigenère cipher?
Definition
polyalphabetic
Term
What is the length of the key called in Vigenère cipher?
Definition
The period
Term
How can the Vigenère cipher be broken?
Definition

1. By examining the ciphertext for multiple repetitions and tabulate their length and the number of characters between successive repetitions.

 

2. From the repetitions, we establish the probable period, using the index of coincidence to check our deduction

 

3. We then tabulate the characters for each key letter separately and solve each as a Caesar cipher.

Term
What is One-Time Pad?
Definition
one-time pad is a variant of the Vigenère cipher
Term
One-Time Pad
Definition

The key string is chosen at random, and is at least as long as the message, so it does not repeat

 

Note: it is a threshold scheme, and is provably impossible to break

Term
Data Encryption Standard
Definition

-designed to encipher sensitive but nonclassified data.

-It is bit-oriented, unlike the other ciphers we have seen.

-It uses both transposition and substitution,referred to as a product cipher

-Its input, output, and key are each 64 bits long


Note: sets of 64 bits are referred to as blocks.

Note: cipher consists of 16 rounds, or iterations

Each round uses a separate key of 48 bits

These round keys are generated from the key block by dropping the parity bits (reducing the effective key size to 56 bits), permuting the bits, and extracting 48 bits. A different set of 48 bits is extracted for each of the 16 rounds.


Note:If the order in which the round keys is used is reversed, the input is deciphered.

Term

What are the serveral modes used by DES?

 

Definition

-Using it directly is called electronic code book (ECB) mode, and is very rare


-Modes in which it can be used to generate a "pseudo-one-time pad" are cipher feed back (CFB) mode and output feed back (OFB) mode


-Its most common modes of use are cipher block chaining (CBC) mode , encrypt-decrypt-encrypt (EDE) mode, and triple DES mode

Term
The CBC mode
Definition

iterative mode in which a block of ciphertext depends not only on its input but also on the preceding ciphertext block


In addition to a 64-bit key, it requires a 64-bit initialization vector


It has the self-healing property. This property says that if one block of ciphertext is altered, the error propagates for at most two blocks.

Term
The EDE mode
Definition

-used by many financial institutions

-It requires two 64-bit keys k and k´


ciphertext c corresponding to some data m is c = DESk(DESk´–1(DESk(m)))

Term
Triple DES
Definition

Triple DES uses three keys k, k´, and k´´


and the second step is an encipherment, not a decipherment: c =DESk(DESk´(DESk´´(m))).

Term
DES importance
Definition

The DES is one of the most important classical cryptosystems in the history of cryptography



Term
Rijndael as the Advanced Encryption Standard 
Definition

-Successor to DES

-Is a Product Cipher

 

-can use keys of 128, 192, or 256 bits and operates on    

     blocks of 128 bits. 


-designed to withstand the attacks to which the DES showed weaknesses


Term

Other Classical Ciphers

Definition

FEAL is another block cipher, with a block size of 64 bits and a key size of 64 bits

FEAL-4 (FEAL with four rounds) and FEAL-8 (FEAL with eight rounds) fell to differential cryptanalysis with 20 and 10,000 chosen plaintexts, respectively

  LOKI89 and LOKI91


 IDEA is an eight-round cipher that uses 64-bit blocks and 128-bit    

  keys, but is too new to tell-It is used in noncommercial software—notably, in the electronic mail program PGP

Term

Public Key Cryptography

Definition

-proposed by Diffie and Hellman

-distinguished between encipherment and decipherment keys

-One of the keys would be publicly known; the other would be kept

  private by its owner


 public key cryptosystem must meet the following three conditions.

 

  1. It must be computationally easy to encipher or decipher a message given the appropriate key.

  2. It must be computationally infeasible to derive the private key from the public key.

  3. It must be computationally infeasible to determine the private key from a chosen plaintext attack.

Term
RSA Cipher
Definition

-Provides both Secrecy and Authentication 

-is an exponentiation cipher

-Choose two large prime numbers p and q, and let n = pq

 

  Note: The totient φφ(n) of n is the number of numbers less

           than n with no factors in common with n.


In addition to confidentiality,  can also provide data and origin authentication


Providing both confidentiality and authentication requires enciphering with the sender's private key and the recipient's public key.

Term

Cryptographic Checksums

Definition

also called a strong hash function or a strong one-way function



Term
What is DES-MAC?
Definition

The DES in CBC mode can be used as a message authentication code if 64 bits or fewer are required.


requires a cryptographic key, this checksum function 

Term
Example of keyless hash functions
Definition

MD2, MD4,MD5, SHA-1(160 bit checksum),

 

Snefru(128 or 256),vulnerable to differential cryptanalysis if four rounds or fewer are used

 

HAVAL (checksums of 128, 160, 192, 224, and 256 bits


Term

HMAC

Definition

A generic term for an algorithm that uses a keyless hash function and a cryptographic key to produce a keyed hash function


strength of HMAC depends on the strength of the hash function h. Various HMAC functions are used in Internet security protocols.

Term
WHAT ARE All cryptosystems are based on?
Definition
 substitution (of some quantity for another) and permutation (scrambling of some quantity)
Term
What is frequency analysis
Definition

IT is methodology for "breaking" simple substitution ciphers, not just the Caesar cipher but all monoalphabetic substitution ciphers.



Term
what is the difference between a monoalphabetic cipher and a polyalphabetic cipher?
Definition

monoalphabetic cipher single cipher alphabet is used per message.


But in polyalphabetic cipher there are multiple ciphertext letters for each plaintext letter, one for each unique letter of keyword.

Term

The difference between substitution and transposition is 

Definition

Subtitution: each letter retains its position but changes its identity


Transposition: each letter retains its identity but changes its position.

Term
What are the characterictics of Mono-alphabetic Substitution Cipher?
Definition
Allow any permutation of the alphabet
Each letter is replaced by a different letter or symbol
Key = permutation  (still need to decide on a key and exchange this information in a secure way).

 

26! Possibilities
Term
What are the characterictics of Poly-alphabetic Substitution Cipher?
Definition
  • uses multiple simple substitution ciphers 
  • The particular one used changes with the position of each character of the plaintext 
  •  There are multiple one-letter keys 
  • The first key encrypts the first letter of the plaintext, 
  • The second key encrypts the second letter of the plaintext, and so on 
  • After all keys are used, you start over with the first key 
  • The number of keys determines the period of the cipher
Term
What is ECB (electronic code book)?
Definition

basically raw cipher.

For each block of input, you encrypt the block and get some output.


The problem with this transform is that any resident properties of the plaintext might well show up in the ciphertext – possibly not as clearly – that's what blocks and key schedules are supposed to protect againt, but analyzing the patterns you may be able to deduce properties that you otherwise thought were hidden

Term
What is CBC mode short for cipher block chaining?
Definition
u have an initialization vector which you XOR the first block of plaintext against. You then encrypt that block of plaintext. The next block of plaintext is xor'd against the last encrypted block before you encrypt this block. 
Supporting users have an ad free experience!