Cryptography Flashcards
(33 cards)
Cryptography
The science of hiding information in order to conceal it from unauthorised parties.
Plaintext
An original message
Ciphertext
A message that has been transformed by the process of encryption.
Encryption/encipherment
The process of transforming plaintext into ciphertext. The process of encryption requires the use of a key.
Decryption
The process of transforming ciphertext back into plaintext.
Encryption Key
The sender and recipient must have an encryption key.
Methods of Encryption
These are the ways in which plaintext is transformed into ciphertext
Types of Encryption
The two main types of encryption are streams ciphers and block ciphers
Types of encryption keys
The two types of keys are symmetric and asymmetric
Methods of Encryption
There are several ways in which plaintext can be transformed into ciphertext:
- Substitution
- Transposition
- Monoalphabetic
- Polyalphabetic
- Running-key
- One-time pads
Substitution cipher
A substitution cipher employs some scheme of character substitution.
Transposition cipher
a.k.a permutation cipher is one in which the character in a plaintext message are rearranged or transposed to form the ciphertext.
Monoalphabetic cipher
A type of substitution cipher where one alphabetic character is substituted for another
Polyalphabetic cipher
This cipher uses two or more substitution alphabets to encipher plaintext.
Running Key Cipher
A practical application on how a substitution cipher is applied to typical messages that are usually many times longer than an encryption key.
It utilises modular mathematics, where alphabetic characters are converted to numeric values.
Block Cipher
A block cipher is used to encrypt and decrypt a block of data such as a message, document or data file. A typical block size is 128 bits. Typical use of block ciphers include:
- File encryption
- Web browser communication sessions (HTTPS)
- SSH (Secure Shel)
- VPN (Virtual Private Network)
Most common block cipher algorithms are:
- AES: Advanced encryption Standard
- DES: Data Encription Standard
- 3DES: Triple DES
- CAST
- Blowfish
- Serpent
Bloch Cipher Modes of Operation
These modes have to do with the way plaintext blocks are brought into the cipher and encrypted:
- Electronic codebook ECB
- Cipher-block chaining (CBC)
- Cipher feedback (CFB)
- Output feedback (OFB)
- Counter (CTR)
Initialisation Vector
An initialisation vector is a starting block of information than is required for several block cipher modes.
The IV is used as part of the input data needed to encrypt the first block in the plaintext message. It must be random.
Stream Cipher
An encryption algorithm that operates on a continuous stream of information, such as a video or audio communications channel
Symmetric Key cryptography
Symmetric cryptography implies that both parties must have possession of the same encryption key in order to be able to send encrypted messages to each other.
Well-known encryption algorithm that use symmetric keys:
- DES
- 3DES
- AES
- blowfish
- IDEA
- RC5
Asymmetric Key Criptography
In asymmetric key cryptography, each user has two keys: a public key and a private key. These keys are mathematically related to each other. The advantage of public key cryptography is that a user’s public key can be distributed to a wide audience, and yet there is no way for any third party to derive or calculate a user’s private key when they know the value of that user’s public key. A user must, however, protect the private key with the same rigor that would be used to protect a symmetric key.
Diffie-Hellman Key Exchange Protocol
The Diffie-Hellman (D-H) key exchange protocol is a means for two parties with no prior knowledge of each other to securely establish a symmetric (shared secret) encryption key.
The strength of the Diffie-Hellman protocol lies in the difficulty of computing the shared secret key ‘S’ without knowing either of the private keys (‘a’ or ‘b’). The security of the protocol relies on the discrete logarithm problem, which is considered computationally infeasible for large prime numbers ‘p’ and appropriate choices of ‘g’.
Cryptanalysis
The study of deciphering an encrypted message without access to the encryption key.
Methods used in Cryptanalysis
- Frequency Analysis
- Birthday Attacks
- Ciphertext-only attack
- Chosen plaintext attack
- Chosen ciphertext attack
- Known plaintext attack
- Man in the middle attack
- Replay attack
- Rubber hose attack
- Social Engineering