4472 - Security Midterm Flashcards
(46 cards)
How does the Cesar cipher work?
Encrypt - shift 3 letters forward
Decrypt - shift 3 letters backward
How does the Vigenere cipher work?
Add a pass phrase to message mod 26
What is Kerckhoff’s principle?
Secrecy of message should be maintained even with knowledge of cipher - secrecy should depend on the key
What is plaintext?
the message being encrypted
what is ciphertext?
the encrypted message
what is a key?
the secret that is used to transform plaintext in to ciphertext
what is the keyspace?
the set of all possible keys
What are the 3 goals of cryptosystem designers?
- key space is exponential in length
- infeasible to brute force
- brute force = adversary’s best strategy
Define the passive adversarial mode
The adversary passively observes ciphertexts
Define the active adversarial mode
Adversary can modify or replace cipher text - man in the middle
What is the CIA triad of security goals?
confidentiality, integrity, authentication
How does Enigma leak information?
Since a plaintext character can never be itself in the ciphertext version, it leaks info regarding what the plaintext isn’t
What does IND-EAV secure mean?
It means that a passive adversary cannot win a security game more than 50% of the time
What is a CPA game?
chosen plain text attack
What is deterministic encryption?
When encrypting the plaintext twice with the same key you get the exact same cipher text
Can a deterministic cipher be IND-CPA secure?
No
What is a chosen ciphertext attack?
adversary is allowed to make encryption queries
What is CCA1?
non-adaptive chosen cipher text attack, adversary can make decryption queries until the challenge cipher text is issued
What is CCA2?
adaptive chosen cipher text, adversary can continue to make decryption queries after the challenge cipher text
What are the idea properties for a block cipher to have?
they should be reversible, easy to encrypt/decrypt with the key but hard otherwise, computing the mapping should be computationally efficient
Encryption in block ciphers should always be what?
a bijection (one to one mapping)
What is the permutation property?
a set of strings will map one to one to itself
how many plaintexts are there in block cipher?
2^b
how many palintext permutations are there in a block cipher?
2^b !