1 - Classical Symmetric Algorithms Flashcards

1
Q

Caesar/Shift cipher

A

key K 1 to 25

Replace each plaintext character with letter K positions further

Inverse = backwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Components of a cryptosystem

A

Set of possible plaintexts
… ciphertexts
… keys (keyspace)
the encryption function E(K,m) (K key is parameter)
the decryption function D(K,c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The encryption (E) and decryption function (D) much be such that..

w/r to a fixed K (key)

A
  • For fixed K, different messages are encrypted to different cipher texts. injective/one to one
  • For fixed K, E/D are inverses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exhaustive Keysearch Attack

A

Try decrypting c using all possible keys in turn, until result makes sense.

Combatted by large keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key is string of n bits. How many keys?

A

2 to the power of n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many keys in a 128bit key

A

2 to the power of 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Absolute minimum number of bits

A

80bits. Most common 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Substitution Cipher

A

Plaintext: alphabet
ciphertext: 26 characters
Key: A substitution table of two rows (top - OG, bottom - cipher)
Encryption/Decryption: Substitute the letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can context be used to crack a cipher?

A

The environment or known patterns of the plaintext can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many possible keys in a substitution cipher

A

26!

26 factorial = 403291461126605635584000000

26 possibilities on first char, 25 on second, 24 on third

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can letter frequencies be used to crack a cipher?

A

Some letters are more frequent in languages and so, patterns can be recognised using this fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vigenere cipher

A

Key: sequence of n numbers from 0 to 26.

Shifts applied corresponding to each number in the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vigenere Cipher: Number of keys

A

26 to the power of n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Permutation cipher: Concept

A

anagrams

Split message into fixed length blocks and apply same permutation in each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Permutation Example Key

A

1 2 3 4 5
3 1 5 2 4

Plaintext: nobod y here
ciphertext: oondb hryee

Inverse:
1 2 3 4 5
2 4 1 5 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Permutation Number of keys

A

n!

n factorial (reasonably large)

17
Q

Does the hacker know the algorithm?

A

Assume yes

18
Q

Ciphertext only attack

A

Eve only has ciphertexts. Obtan plain or key

19
Q

Known plaintext attack

A

Eve has plaintext(s) and corresponding ciphertext(s)

20
Q

Chosen plaintext attack

A

Eve obtained temporary access to encryption and encrypted a custom plaintext

21
Q

Chosen ciphertext attack

A

Eve has temporary access to decryption and decrypts a chosen ciphertext