3.5.6.8 Encryption. Flashcards

1
Q

Define encryption.

A

Process of scrambling data so it cannot be understood by others, unless they know the method used to encrypt and the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define decryption.

A

Process of turning the scrambled data back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define plaintext.

A

Data in human-readable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define cyphertext.

A

Data that has been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Outline a Caesar cipher.

A

Caesar ciphers encrypt information by replacing characters. One character is always
replaced by the same character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Outline the two types of Caesar ciphers.

A

Shift ciphers and substitution ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Outline the process of a shift cipher.

A

When encrypting using a shift cipher, all of the letters in the alphabet are shifted by the
same amount. The amount by which characters are shifted forms the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Outline a substitution cipher.

A

Substitution ciphers are a type of Caesar cipher in which letters are randomly replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are Caesar ciphers so easily cracked?

A

The frequency at which each character occurs can
provide a clue as to which letter has been replaced with which. The most commonly
occurring letter in English is likely to be an E. Once you discover just one character, a shift cipher can be completely cracked, as the key can be found.
This is known as frequency analysis.

Substitution ciphers are a little
better but are still relatively easy to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outline the brute force approach.

A

The shift cipher (Caesar) is insecure as there are only 26 possible choices for the key, meaning that each number could be tried, one by one, until the encryption (aka brute force).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a vernam cipher.

A

The Vernam cipher is an example of a one-time pad cipher. Additionally, the Vernam cipher requires the key to be
random and at least as long as the plaintext that is to be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a one-time pad cipher.

A

The key is used once before being discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Outline the process of the vernam cipher.

A
  1. Aligning the characters of the plaintext and the key.
  2. Converting each character to binary (using an
    information coding system).
  3. Applying a logical XOR operation to the two bit
    patterns.
  4. Converting the result back to a character.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Outline decoding a vernam cipher.

A

Since the key is random, the ciphertext is random and so the cipher is considered completely secure. Vernam is the only cipher mathematically proven to be completely secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compare Vernam cipher with ciphers that depend on computational security.

A

All ciphers other than the Vernam cipher are, in theory, crackable, but not within a
reasonable timeframe given current computing power. Ciphers that use this form of
security are said to rely on computational security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly