Cryptography Flashcards
What are the 4 fundamental goals of cryptography?
- Confidentiality
- Integrity
- Authentication
- Non repudiation
What is a message called before and after it is encrypted?
Plaintext & cyphertext
What is the Kerchoff principle?
States that a system should be secure even though everything is known.
What is FIPS140-2?
Federal Information Processing Standard. It is the definition for hardware and software requirements for crypto.
Logical AND
Both items need to be true.
Logical OR
v
At least one is true
Logical NOT
~
Inverse
Exclusive OR (XOR)
+
Only one needs to be true
Modulo
%
Remainder
One way function is…
The basis of public crypto systems.
What is a nonce?
Random number that acts as a placeholder for a variable in a formula.
What is the concept of zero knowledge proof?
Ability for a third party to prove knowledge of a password without divulging the password.
Split knowledge can also be called…
Separation of duties.
What is M of N control?
M = minimum number of people needed to divulge. N = Total population of key holders
What is a transposition cipher vs substitution cipher?
rearranging letters vs substituting them
What is a polyalphabetic cipher?
The use of multiple alphabets to encrypt the data.
What is frequency analysis vs period analysis?
Studying the frequency of characters to break an encryption mechanism.
What must be performed to ensure the integrity of a one time pad?
- The one time pad must be truly random.
- Pad must be kept secret and used once.
- Key must be as long as the message.
What is a major obstacle of one time pads?
They are not scalable.
What is a running key cipher?
Cipher is from a known string of characters ie a book.
What is a block cipher vs a stream cipher?
Block operates on a groups of characters at the same time vs stream does one at a time.
What is confusion and what is diffusion?
Confusion - Complication of relationship between plaintext and ciphertext
Diffusion - One change causes additional downstream changes.
What is a symmetric key system and what are its weaknesses
Key is shared amongst others.
Weaknesses: key distribution, scalability, no non-repudiation, new keys needed frequently.
Keys needed (n*(n-1))/2
What is an asymmetric key system and what are its strengths/ weaknesses?
Public/ private key system
Strengths: group changes are less impactful, provided non-repudiation
Weaknesses: slower
Keys needed: n*2