General Cryptographic Schema Flashcards

1
Q

General model for network security

A
  1. A message is to be transferred from one principal (Sender) to another (Recipient) across some sort of Internet service.
  2. A logical information channel is established by defining a route through Internet from source to destination and by principals’ cooperative use of communication protocols (e.g., TCP/IP).
  3. All techniques that provide security have two components:
    - security-related transformation on info being sent
    a. encryption - unreadable by opponent AND/OR
    b. addition of a code to verify sender identity of
    sender (MAC)
    - secret information shared by two principles
    a. encryption key to scramble the message
  4. A trusted third party may be needed to achieve secure transmission of secret information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

E(Key1, Plaintext) -> Ciphertext C (transformation or a function E that takes input, key and plaintext to generate a ciphertext C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is decryption?

A

D(Key2, Ciphertext) -> Plaintext P (transformation or a function D that takes input, key and ciphertext to generate a plaintext P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is plaintext?

A

text that can be read and understood by a human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ciphertext?

A

text that is transformed so it needs to be processed to be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cipher?

A

a function that performs encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a symmetric algorithm?

A

Key1 = Key2 (encryption and decryption keys are the same) this means, they can easily be derived from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric/ public-key algorithm?

A

Key1 NOT EQUAL to Key2 (encryption and decryption keys are different) this means, they cannot be derived from each other.

Public key can be published without compromising the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does security depend on?

A

depends only on the secrecy of the key and not the algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lecture 2.1 example (slide 12) for 26 alphabets - map each letter to a number (Start at 0)

A
C = E(K, P) = (P + K) mod 26
P = D(K, C) = (C − K) mod 26
How well did you know this?
1
Not at all
2
3
4
5
Perfectly