Cryptography Flashcards

1
Q

Draw a cryptographic block diagram:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a code system?

A

Use of codewords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cipher Systems

A

Use a secret key on the characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classical Ciphers: Transposition

A

Rearranges the letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classic Ciphers: Substitution Cipher

A

Replaces characters with alternate characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Classic Cipher: Product Cipher

A

Combination of transposition and substitution ciphers.

Will both rearrange AND use a different character set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classic vs. Modern ciphers

A

Classic: Act on characters and words.
Modern: Act on data bits representing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modern Cipher: Block Cipher

A

Devites the PT into fixed size chunks and operates on each chunk individually IOT produce CT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Modern Cipher: Stream Cipher

A

Uses an algorpith to produce a stream of binary digits called the cryptographic bit stream. The cryptographic bit stream is combined with the plain text bit stream through the use of an XOR operation to produce the CT bit stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two types of key management:

A

Public Key
Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Private Key

A

Same key for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Key

A

Two different keys: A public one for encryption and a private one for decryption. Only the receiver has the decryption key but everyone has the one for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Encryption Standards (DES)

A

Symmetric Encryption algorithm using a 56 bit key. Not computationally secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advanced Encryption Standard (AES)

A

Symmetric Encryption algorithm, 256 bit key, computationally secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Key Signature

A

The sender uses a private key to encrypt a block chain in a method unique to her key. The decryption key is public and by decrypting it, you verify that only the sender could have encrypted it with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSA

A

An encryption and digital signature algorithm

17
Q

Decrypting: Brute Force

A

Uses trial and error of all key possibilities until the key is found.

18
Q

Decrypting: Cryptanalysis: Analytical

A

Develops equations to solve for the code.

19
Q

Decrypting: Cryptanalysis: Statistical

A

Explotes statistical relationship between PT and CT due to redundancies in language and formatting. Less effective with modern ciphers but good for classic.

Example is simple words like I, the, is, etc. can be easily determined.