SB 6: Basics of Cryptography Flashcards

1
Q

What are the two types of transformation cryptosystems are based on?

A

Onfusion: replaces part of the plaintext message with other data, to hide the original content.
Diffusion: scrambles the plaintext message so that the original content is spread throughout the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can cryptography provide?

A

Keep information secret thus countering disclosure threats. Origin and data integrity. Non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Kerckhoff’s principle say?

A

The security of cryptosystems cannot rely on an adversary’s not knowing the algorithms for encryption and decryption. It is therefore standard practice to assume this information and the set of possible keys is known, but not the specific cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is in a cryptosystem?

A
  1. plaintext
  2. keys
  3. ciphertext
  4. enciphering functions
  5. deciphering functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are three types of attacks on cryptosystems?

A

Ciphertext only: the attacker only has the ciphertext. The goal is to find the corresponding plaintext, and maybe the key if possible.
Known plaintext: the attacker has the ciphertext and the plaintext that was enciphered. The goal is to find the key.
Chosen plaintext: the attacker may ask that specific plaintext be enciphered. Access is given to the corresponding ciphertext. The goal is to find the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a transposition cipher

A

Scrambles. It rearranges the characters in the plaintext to create the ciphertext. Each key is created through a permutation algorithm. Can attack using anagramming, statistical analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a substitution cipher

A

It changes characters in the plaintext to produce the ciphertext. Susceptible to statistical analysis based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is keyspace and how can it be improved?

A

The number of keys that can exist for a given algorithm. Generally speaking the length of the key has a direct correspondence to the size of the keyspace. A longer key = larger keyspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the Caesar cipher?

A

It is an alphabet shift cipher. It works by shifting the alphabet 3 letters forward. The key for the cipher is therefore 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a symmetric cryptosystem?

A

The same key is used for both enciphering and deciphering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some advantages to not keeping cryptography algorithms secret?

A

It can be standardised. More experts can evaluate and analyze. “Many eyes principle” - can be more secure if many people can analyze it to find areas of improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly