Domain 3: Security Engineering Flashcards
Ceaser Cipher
substitution cipher, shift 3 letters to the right
Four Fundamental Goals of Cryptography
Confidentiality, Integrity, Authentication, Nonrepudiation
Key space
defined by bit size. a 128 bit key has a value from 0 to 2^128
The Kerchoff Principle
a cryptographic system should be secure even if everything about the system, except the key, is public knowledge
Cryptovariables
cryptographic keys
Crptography
the art of creating and implementing secret codes and ciphers
Cryptanalysis
the study of methods to defeat codes and ciphers
Cryptology
Cryptography + Cryptanalysis
Boolean mathematics
defines rules used for bits and bytes
modulo function
remainder after division
One- way function
operation that easily produces output values for each possible combinations of input but makes it impossible to reverse engineer
Nonce
random number that acts as a placeholder variable, must be random and used one time only ex: Initialization Vector
IV
Initialization Vector - a random bit string as long as the block that is XORed with the message
Zero-knowledge proof
The magic door - watch someone go in one entrance and come back before buying their password
Work function
time and effort required to perform a complete brute-force attack, directly proportional to the security and protection of the crytosystem
Difference between Codes and Ciphers
codes are not meant to provide confidentiality
Transposition Ciphers
rearrange the letters of the plaintext
Substitution Cipher
replace each bit of plaintext with a different character
Ceaser Cipher encryption function
C = (P+3) mode 26
Vigenere Cipher
polyalphabetic - alphabet written 26 times
Period Analysis
examination of frequency based on the repeated use of the key
One-Time Pads
substitution cipher, use a different substitution alphabet for each letter
One-Time Pad encryption function
C = (P+K) mod 26, K = key
One-Time Pad Security Requirements (4)
Random, used once, physically protected, as long as the message