Week 2 - Symmetric Encryption Flashcards

1
Q

What is cryptography?

general idea

A

General idea that describes the practice of coding and hiding messages from potential enemies (been around for thousands of years)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

the action of taking a plaintext message + apply a cipher to it = ciphertext, garbled unreadable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 2 components a cipher is made out of?

A
  1. the encryption algorithm
  2. the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s an encryption algorithm?

A

the processes that convert the plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key when it comes to the cipher operation?

A

it introduces something unique into your cipher so anyone using the same algorithm can’t decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does security through obscurity mean?

A

basically that if no one knows what algorithm we’re using, we’re safe from attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a cryptosystem?

A

Even if the enemy knows your exact encryption algorithm, they’re still unable to recover the plaintext from an intercepted ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cryptanalysis?

A

looking for hidden messages, trying to decipher coded messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frequency analysis is the practice of studying what?

A

studying the frequency with which letters appear in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was the first programmable digital computer developed during WWII to aid in the use of automation technology to apply to cryptanalysis?

A

Colossus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is steganography the practice of?

A

the practice of hiding information from 3rd parties but not encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s an example of steganography?

A

Writing a letter with invisible ink, must be made visible using a mechanism known to the recipient

(no decoding necessary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some modern steganography techniques?

A

embedding messages or files into other files (images, videos) that can be extracted using steganography software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a symmetric key algorithm? Why is it called symmetic? (1)

A

These are called symmetric because they use the same key to encrypt and decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a substitution cipher?

A

an encryption mechanism that replaces parts of the plaintext with ciphertext

(like when you substitute certain letters for other letters in a message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ROT13 substitution cipher?

A

you rotate the alphabet (in order) 13 places

For example, A would become N

(this is also an example of a Caesar Cipher)

17
Q

What’s a Caesar Cipher?

A

substitution using the alphabet, usually by shifting or rotating it

18
Q

ROT13 is a ___ Cipher that uses a key of ____

A

ROT13 is a Caesar Cipher that uses a key of 13

19
Q

What’s a stream cipher?

A

1 to 1 input/output encryption of a digit or character

(takes 1, encrypts 1 in and out)

20
Q

How does a block cipher encode data?

A

Places data into a bucket/block of a fixed size, encodes entire block as 1 unit

21
Q

Which symmetric ciphers are faster and less complex but may be less secure: stream or cipher?

A

Stream ciphers

(if the same key is used to encrypt data 2+ times, it’s possible to break the cipher and recover plaintext)

22
Q

What does a key size comprise of? (defined in bits/data)

A

the total number of bits/data that comprises the encryption key

23
Q

Key size is the upper limit for the total possible keys for a given ___ ____

A

encrypted algorithm

24
Q

What symmetric block cipher replaced DES?

A

AES (Advanced Encryption Standard)

25
Q

What’s the difference between AES and DES symmetric encryption? (2)

A

AES:
- uses 128-bit blocks (2x the size of DES 64-bit)
- supports key lengths of 128, 192, or 256-bit

26
Q

Are brute force attacks possible on AES encryption standards today?

A

No, because of the large key size and computing power/time required those attacks are only theoretical right now

27
Q

What popular algorithm was dropped due to its weakness and vulnerabilities?

A

RC4 (Rivest Cipher 4), a symmetric stream cipher

(used in WEP, WPA, SSL, TLS)

28
Q

Web browsers dropped support for RC4 along with all versions of SSL and adopted what instead?

A

TLS