Cryptography Flashcards
What asymmetric algorithm is based on the fact that 2 very large prime numbers can be multiplied easily but can’t be factored easily. Used for digital signatures and key encryption.
RSA
3DES features
Uses 168bit key
Uses 48 rounds of computation
AES features
Uses 128, 192, 256bit keys
Uses 14 rounds of computation
DES features
Based on 128bit lucifer algorithm
Uses 16 rounds of computation
Data origin authentication definition
A system based authentication that verifies the source of a message
Cryptanalysis definition
The process of studying ciphertext and cryptosystems to identify weaknesses
Key clustering definition
The same ciphertext generated from the same plaintext using two different keys
Cipher definition
An algorithm that uses random symbols to represent plaintext units or single letters in the form of ciphertext.
ciphertext definition
encrypted data that is unreadable until it is converted into plaintext.
3 characteristics of quantum cryptography
based on the laws of quantum mechanics
generates a cryptographic key that can be exchanged securely between remote users
combines quantum cryptographics with traditional algorithms to distribute secret keys
What method uses human interaction to obtain encryption keys and valuable information
social engineering
What method uses trial and error attack to try every possible key until it succeeds
brute force
What method examines multiple pieces of ciphertext to determine trends or statistical data
ciphertext only
What method examines power requirements and duration of the encryption process to find the encryption key
differential cryptanalysis
What method searches both plaintext and ciphertext from the same message to find the encryption key
known plaintext
What attack collects hash values in a table to save time in hash function attacks
rainbow table
What attack examines the plaintext and ciphertext for linear approximations
linear cryptanalysis
What attack exploits weak points in block ciphers with highly mathematical structures
algebraic
What attack decrypts ciphertext and examines the plaintext result to find the key
chosen ciphertext
What attack uses the algorithm and encryption device to find the encryption method
chosen plaintext
define ciphertext
data that has been encrypted
define plaintext
original text before encryption
define decipher
act of decrypting ciphertext
define encipher
act of encrypting plaintext