Lecture 1: 18th September 2019 Flashcards

Cryptography, lecture 0

1
Q

What is cryptography?

A

Cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms to transform messages in ways that are hard to decipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is plaintext?

A

Unencrypted information prior to encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ciphertext?

A

The result of encrypting a plaintext input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

Methods of encoding messages or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption turns plaintext into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is decryption?

A

The methods by which encrypted ciphertext is converted back to its original source plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cryptosystem?

A

A group of cryptographic algorithms needed to implement a particular security service, usually encryption: key generation, encryption, decryption. They usually share a common key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an encyption algorithm?

A

A mathematical procedure in order to apply a predefined code to information to make it illegible to parties unauthorised to read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an encryption key?

A

A pseudo-random set of data used with encryption algorithms to encrypt data. They are designed to be unique and unpredictable. Only parties with the necessary key can read encrypted data, so their distribution can be used to dictate who is authorised to read certain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you notate an encryption operation? Include ciphertext, the encryption algorithm, key, and plaintext.

A

C = E(K,P)

where
C = ciphertext
E = encryption algorithm/s
K = encryption key
P = plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ciphertext only attack? What are its aims?

A

Attempts to circumvent and surpass the security of a cryptographic system in which the malevolent party only has access to one or more ciphertexts.

Successful attempts manage to deduce the corresponding plaintexts and/or the encryption key/s being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a known-plaintext attack? What are its aims?

A

Attempts to circumvent and surpass the security of a cryptographic system in which the malevolent party has one or more pairs of corresponding plaintexts and ciphertexts.

Attackers aim to deduce the cryptographic key/s being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a chosen plaintext attack?

A

Attempts to circumvent and surpass the security of a cryptographic system in which the malevolent party can obtain an arbitrary number of plaintexts corresponding to chosen plaintext inputs.

Attackers aim to gain any information that allows them to deduce more about the encryption scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cryptanalysis?

A

The analysis of cryptographic systems in an attempt to breach their confidentiality and authorisation mechanisms. They aim to gain an algorithm to decrypt all encrypted messages and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are people often the weak points of encryption systems?

A

Encryption algorithms are often too strong for cryptanalysts to break in reasonable amounts of time with brute force methods. The way people use them often allows them to do so more easily. Pattern recognition and frequency analysis can be performed on frequently recurring words, patterns, or letters, to allow information regarding the encryption mechanisms to be deduced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is frequency analysis?

A

The study of letters or groups of letters contained in a ciphertext in an attempt to reveal the message. Letters and groups of letters are not evenly distributed in natural human languages. Mappings can be built from ciphertext frequencies to the language in use to reveal its contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you break the Caesar cipher?

A

Find the frequencies of each letter, and try to find a grammatically valid mapping in which the frequencies of both letters are equal in both the ciphertext and language as a whole.

17
Q

What is a substitution cipher?

A

An algorithm for encryption and/or decryption in which letters are swapped to generate a mapping which can be used to switch (substitute) ciphertext and plaintext letters.

18
Q

What is a one time pad?

A

An encryption algorithm that uses one-time use keys, traditionally on paper “pads”, to encrypt plaintext information. Each key can only be used once and must be equal to or greater than the information in length.

19
Q

How do one time pads work?

A

Have plaintext input and current key. Sum the ith characters in the plaintext and key to produce the ith character in the ciphertext. Do this for all the characters in the plaintext.

20
Q

Why are one time pads hard to break?

A

Pseudo-randomness of key (and use of one at all) breaks normal frequencies of letters in ciphertext and removes any direct mapping between plaintext and ciphertext letters. Different key each time makes it even more difficult to decrypt.

21
Q

What is the Vernam Cipher?

A

OTP with numbers; key a sequence of pseudo-random numbers. Input text characters (all letters) converted to numeric equivalent (a - 1, b - 2, c - 3, etc) and then added to corresponding (ith) key number. The resulting ciphertext number is this sum modulo 26.

22
Q

What is a Vigenere Tableau?

A

A matrix of the letters a-z as the rows and columns that stand in for the value of key and plaintext letters. To find a ciphertext, find the row corresponding to the current plaintext letter, and then the column corresponding to the key letter within that row.

23
Q

What is a Vigenere Cipher?

A

An algorithm for encryption and/or decryption which uses Vigenere Tableaus. These are a matrix of the letters a-z as the rows and columns that stand in for the value of key and plaintext letters. To find a ciphertext, find the row corresponding to the current plaintext letter, and then the column corresponding to the key letter within that row.

This cipher cannot be broken by frequency analysis as there is no direct mapping from plaintext to ciphertext characters but can be broken with transposition, but can be by deducing the key length from repeated mappings of words, by chance, if the key is shorter than the ciphertext, and the ciphertext is long enough. Once the key length is known it is straightforward to obtain the plaintext, and afterwards the key.

24
Q

What is a Book Cipher?

A

An algorithm for encryption and/or decryption which uses a book or a certain section thereof as the encryption key. They will be decided prior to communications and accessible by both parties. OTPs often uses books for keys in this manner.

25
Q

What is a message transposition?

A

Methods of shifting the position of characters in plaintext by amounts determined by some regular system or algorithm. This produces some permutation (different ordering) of the message.

26
Q

What is a message permutation?

A

Methods of rearranging the characters in plaintext by some regular system or algorithm.

27
Q

What is pattern analysis?

A

The study of patterns in one or more letters in repeated sequences of ciphertext in the process of cryptanalysis.

28
Q

How can pattern analysis extend past lone letters?

A

Natural languages has sequences of commonly repeated groups of multiple letters (n-grams) that can also be analysed in a manner similar to the frequency analysis on sole letters. For example, “rh” and “ent” are common digrams and trigrams in English.

29
Q

What is a column transposition?

A

When you scramble text by putting it into a grid of n columns and reading output as letters top to bottom and then left to right - i.e. vertically then horizontally rather than horizontally then vertically as in the original.

30
Q

What is the foremost aim of attacks on cryptographic systems?

A

To find the encryption key/s being used.

31
Q

What is a digram?

A

A pair of letters.

32
Q

What is a trigram?

A

A group of three letters.

33
Q

What is n-gram analysis? What can it be used to attack?

A

The analysis of the frequencies of groups of letters in ciphertexts as part of cryptanalysis.

It can be used to attack ciphertexts which have undergone transpositions. This can be inferred by the frequencies of individual letters being normal but n-grams being scrambled. It can be attacked by finding a n-gram split across two columns by comparing it to the n-gram seen in full within a column elsewhere to find the number of columns to reverse the transposition.

34
Q

What is pigeon code?

A

Messages carried by pigeons in the National Pigeon Service in WW2 that were encrypted with different encryption algorithms, including OTPs.