Intro to Cryptography Flashcards

1
Q

state Kerckhoffs’ principle

A

a cryptosystem should be
secure even if everything about the system, except the key,
is public knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the goals of a cryptosystem

A

Confidentiality
Authenticity
Integrity
Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the difference between pseudo random numbers and truly random numbers?

A

The difference between true random number generators (TRNGs) and pseudo-random number generators (PRNGs) is that TRNGs use an unpredictable physical means to generate numbers (like atmospheric noise), and PRNGs use mathematical algorithms (completely computer-generated).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two Encipherment Modes

A

Stream cipher and block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are advantages and disadvantages of stream cipher?

A
Advantage
•Speed of transformation
•Low error propagation
Disadvantage
•Low diffusion
•Susceptibility to malicious insertion and modifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are advantages and disadvantages of block cipher?

A
Disadvantage
•Slowness of encryption
•Error propagation
Advantage
•Diffusion
•Immunity to insertion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are shannon’s characteristics of a good cipher?

A

•The amount of secrecy needed should determine
the amount of labor appropriate for encryption and decryption
•The set of keys and the encryption algorithm should be free from complexity
•The implementation of the process should be as simple as possible
•Errors in the ciphering should not propagate and cause corruption of
further information in the message
•The size of enciphered text should be no larger than the
text of the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the reasons for kerchoffs principle

A

Algorithms are difficult to change
•Cannot design an algorithm for every pair of users
•Expert review
•No security through obscurity!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is confusion?

A

The interceptor should not be able to
predict what changing one character in
the plaintext will do to the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is diffusion?

A

The characteristics of distributing the
information from single plaintext letter
over the entire ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the types of cryptanalytic attacks

A

Ciphertext only
only knows encryption algorithm and ciphertext, goal is to identify plaintext

Known plaintext
know encryption algorithm and one or more plaintext &
ciphertext pairs formed with the secret key

Chosen plaintext
know encryption algorithm and can select plaintext and obtain ciphertext to attack cipher

Chosen ciphertext
know encryption algorithm and can select ciphertext and obtain plaintext to attack cipher

Chosen text
know encryption algorithm and can select either plaintext or ciphertext to en/decrypt to attack cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is unconditional security

A

no matter how much computer power is
available, the cipher cannot be broken since the
ciphertext provides insufficient information to
uniquely determine the corresponding plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is computational security

A

given limited computing resources (e.g. time
needed for calculations is greater than age of
universe), the cipher cannot be broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly