Actual Intro Flashcards

1
Q

What is symmetric encryption?

A

When a message is encrypted and decrypted using the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the limitations of symmetric encryption?

A

Security is inherently reliant on the secrecy/privacy of the key, so if the key is leaked, the system will no longer be secure.

In addition, both parties need to receive the key first to be able to use it, which can risk exposing the value of the key if not done in an encrypted manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the requirements for a good cypher?

A

FOR SENDER AND RECEIVER:
1. That, given the possession of the key, it’s easy for the sender or receiver to encrypt/decrypt the message.

FOR ADVERSARY:
1. That the adversary will find it difficult to encrypt/decrypt a message without the necessary key. (Confusion)

That the ciphertext must perform better than brute force.
That the relationship created by the key between the plaintext and ciphertext doesn’t reveal any information about the ciphertext/plaintext. (Confusion, Diffusion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What resources can an adversary be provided with to assist in an attack?

A
  1. Cache of random ciphertexts.
  2. Cache or random plaintext/ciphertext pairs.
  3. Chosen plaintexts (the ability to find the ciphertext of certain plaintext strings)
  4. Chosen ciphertext (the ability to find the ciphertext of certain plaintext strings as well as the ability to choose the plaintext of a certain ciphertext)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security designations can be given to a symmetric encryption algorithm?

A

IND-CPA (Resistance to a chosen plaintext attack)
IND-CCA (Resistance to a chosen ciphertext attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “keyspace”?

A

The amount of possible variables a key can be. For example, the keyspace of “K” if K can only be a single digit number would be 10 (0 to 9).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the Caeser Cipher work?

A

c = (m + k) mod 26
m = (c - k) mod 26
- where k is the amount of shit.

Or in non-autistic terms:

For k, draw an alphabet with a shifted alphabet underneath it. Caeser 3 would be:

ABCDEFG
DEFGHIJK

So “ABE” would be “DEH”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is the Caeser Cipher secure?

A

No, as its keyspace is very low. With a size of 26, it would be trivially rapid to brute force the key.

Given the requirement that brute-force is easy, this fails the requirement for this algorithm to be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Substitution Cipher?

A

Given a permutation key, replace letters with the given permutation key for the alphabet.

Example:

ABCDEFGHIJKLMNOPQRSTUVWXYZ
DABCZHWYGOQXSVTRNMSKJIPFEU

HELLO -> YZXXT

There is no easy order to this unlike what is found in the Caeser cipher, which is due to the keyspace being larger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the Substitution Cipher secure?

A

No, as although the keyspace is very large at 26 factorial (more than 1 trillion trillion combinations), information from the ciphertext can help in figuring out what the plaintext might be.

For example, e is the most common letter in the English language, so the most common letter in the ciphertext can likely be substituted with e to help find the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Vignere Cipher?

A

The Vignere cypher effectively uses multiple shift cyphers to encrypt the plaintext into cipher text.

This can be done by making a grid of the alphabet where x and y are letters and then using a word as a key.

@ A B C D E
A a b c d e
B b c d e f
C c d e f g
D d e f g h
E e f g h i

If we wanted to encrypt plaintext “ABE” using “CAB”, that would give “CBF”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the Vignere Cipher secure?

A

Still not secure, though frequency analysis is more difficult for this algorithm than it is for the Caeser or Substitution cypher. Words would still be able to be inferred through frequency analysis, such as “the”, which is the most common word in the English language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly