Chapter 6 Flashcards
(23 cards)
When developing a cryptographic system, what are the 3 different types of data:
At rest
Data in motion
Data in use - (active memory)
Message Integrity is enforced through the use of encrypted message _____, known as ____ ____
Message Integrity is enforced through the use of encrypted message DIGESTS, known as DIGITAL SIGNATURES
In authentication, name of the technique to ensure that Bob is who he claims to be
Challenge-response
What is the key space?
Is the range of values that are valid for use as a key for a specific algorithm.
Set of all possible permutation for a key
Bit size
Number of binary bits (0s and 1s) in the key
Kerckhoffs principle
Concept about encryption to keep algorithms known and public
Difference between cryptography and cryptanalysis
cryptography - art of creating secret codes and cipher
cryptanalyis - the study of methods to defeat codes and ciphers
AND simbol:
OR simbol:
v
What is Exclusive OR (XOR)? When XOR is true?
It’s TRUE only when ONLY ONE of the input is true
0 x 1 = 1
1 x 0 = 1
0 x 0 FALSE
1 X 1 TRUE
NONCE definition
randon number generated at the moment of processing for one-time use
Zero Knowledge proof
Cryptography mechanism to prove your knowledge of a fact to a third party without the revealing the fact itself to that third party.
WHen usually “zero knowledge proof” is usually applied?
Passwords and other secret authentications
Split knowledge definition
WHen the information or privilege required to perform an operation is divided among multiple users.
Work Function - Definition in cryptography
It’s a measure of the strenght. It’s how long a password takes to be brute-forced. The size of the work functions should be matched against the relative value of the protected asset.
Difference among “code” and “cipher”
Code is a way to represent words or phrases, sometimes secret but they are NOT necessarily meant to provide CONFIDENTIALITY
Cipher is MEANT to PROVIDE CONFIDENTIALITY
Transposition Ciphers, what does that do?
Rearrange the letters of a plaintext message
Substitution Ciphers how does it work?
Replacing each character or bit of the plaintext message with a different character
Polyalphabetic substitution ciphers how does it work
Provide multiple alphabets in the same message to hinder decryption efforts
Polyalphabetic substitution protects against _____ _______ analysis, but it is vulnerable to a second-order form of frequency analysis called _______ analysis
Polyalphabetic substitution protects against DIRECT FREQUENCY analysis, but it is vulnerable to a second-order form of frequency analysis called PERIOD analysis
HOw does One-Time Pads works?
it uses a different substitution alphabet for each letter of the plain text message.
what are the 4 requirements to ensure the integrity of the One-TIme pad algorithm?
The pad must be randomly generated it has to be Physically protected against disclosure Must be used only once Key at least as long as the message to be encrypted
Running Key Ciphers definition
Also known as “Common book”. The encryption key is as long as the message itself and is often chosen from a common book`