Chapter 7 - Crypto Flashcards
(140 cards)
Monoalphabetic vs polyalphabetic
Mono - one alphabet
Poly - many alphabets
Substitution cypher
Replacing a letter for each letter with a predetermined one
Cipher
Algorithm or key
Scytale cipher
A piece of paper wrapped around a staff that could only be viewable on the correct size staff
Project lucifer
The original IBM project that NSA used to make DES
Cryptanalysis
Analyzing an encryption trying to figure out the key
Crypto system
A system that creates a crypto
Cryptovariable
The key
Key space
This is how large the key is in bits
Kerchiefs principle
Algorithm of a crypto system should always be known, only the key should be secret, others believe it should all be secret.
What gives a cryptosystem strength?
Algorithm Key length Secrecy Initialization Interoperability
Work factor
The length of time it will take to discover a message by brute force
Crypto offers what benefits?
Confidentiality Integrity Authentication Authorization Nonrepudiation - cannot deny it came from the sender
Encipher
Making data unreadable
Vernam cipher - one time pad
DUO could be an example of this..
Exclusive-OR (XOR) - if different than 1 if same than 0
Message - 1001
Key - 1100 (same length as message)
Ciphertext - 0100
Only useful one time to not develop patterns
Rules of crypto as I see it
Key - keep it secret, keep it safe
Random - computers are NOT random
Cipher - the word “the” is your enemy
Running key cipher
Physically analyzing data like the letter in a book with coordinates
Running to piece to piece to get the answer
Concealed cipher
Every third word is part of the message
Steganography
Hiding messages within other media .. Ex. Inside the Theodore jpg image
Security through obscurity.. Yikes
Least significant bit - LSB
These are the bits in the medium that do not affect the output, a perfect place to hide a message
Digital watermarking / DRM
Uses stenography to embed a logo or company specific information in the data using the LSB
Microdot
A micro photo put inside the wax of a stamp
Caesar cipher
Substitution cipher, a=z
Transposition cipher
Word grouping and scrambling based on a key