Cryptography Flashcards
(258 cards)
What does CIA mean in relation to Cryptography?
Confidentiality, Integrity and Authentication
What is non-repudiation?
An action that cannot be denied
Non-repudiation can be used to provide what 3 things?
Identification, Authentication and Accountability
What is a mono-alphabetic substitution?
A system that uses only a single alphabet to encrypt and decrypt a message
What is a practitioner of cryptography known as?
Cryptographer
What term is used to describe the science of deciphering cipher text without the cryptographic key?
Cryptanalysis
What is Cryptology?
The science of cryptography and cryptanalysis
What is a practitioner of Cryptology called?
Cryptologist
What is a plaintext message?
A message in its original readable format
What is a ciphertext message?
A plaintext message that’s been encrypted
What other term can be used to describe decryption?
Deciphering
What are two methods of encrypting traffic on a network?
End-to-End encryption
Link encryption
What type of encryption is used where a packets are encrypted at the original source and then decrypted once they reach the final destination?
End-to-End encryption
What are the two advantages of end-to-end encryption?
Speed
Overall security
What is the downside to end-to-end encryption?
Only data in encrypted, not routing information
What is Link encryption?
requires that each node (ie router) has separate key pairs for its upstream and downstream neighbours. Packets are encrypted and decrypted at each node along the network path
What is the advantage of link encryption?
Entire packet including routing information is encrypted
What are the two disadvantages of link encryption?
- Latency
- Inherent vulnerability: If a node is compromised or a packets decrypted contents are cached on the router then the data can be compromised
What is the hardware or software implementation that transfers plaintext into ciphertext known as?
A cryptosystem
What 3 properties must an effective cryptosystem have?
- efficient method of encrypting and decrypting keys on the system
- cryptosystem is easy to use
- strength of the cryptosystem depends on the secrecy of the keys
What is a keyspace in relation to a cryptosystem?
A range of all possible values for a key within a cryptosystem
What is a keyspace in relation to a cryptosystem?
A range of all possible values for a key within a cryptosystem
What is a restricted algorithm?
refers to an algorithm that must be kept secret in order to provide security.
What is the disadvantage of a restricted algorithm?
relies on secrecy of the keys rather than complexity of the algorithm used