EXAM 1 Flashcards
What is ciphertext
Message after transforming it with encryption
What is Encryption?
Converting plaintext to ciphertext
What is Decryption?
Restoring plaintext from ciphertext
What is a Cipher?
The algo that can take plaintext and convert it to ciphertext, (it goes both ways)
What is Cryptanalysis?
The science of breaking ciphers
What is Cryptology?
Cryptography + Cryptanalysis
How are encryption algorithms classified?
How do they convert plaintext to ciphertext
How many keys they require
How do they process the plaintext
How do substitution ciphers work?
Replacing elements of plaintext, with elements of ciphertext
How do Transposition ciphers work?
Shuffle the elements of the plaintext
How do Product Ciphers work?
Combine Substitution, and Transposition
What is Symmetric Encryption?
Single key used for encryption and decryption
What is Asymmetric (public Key) cryptography?
Two-keys, one is used for encryption, the other is used for decryption.
Asymmetric (public Key) cryptography is commonly used for…
session key distribution, and digital signatures.
What is the difference between a block and stream cipher?
Stream does 1 by 1, block does multiple at a time.
What are the security requirements for secure symmetric key cryptography?
- Strong encryption algorithm,
- Assumption that attacker knows knows the encryption algorithm
- Trusted third party, to distribute the key
What is Kerckhoff’s Principle?
Everything must remain secure even if the attacker knows everything EXCEPT the secret key.
If an attacker finds, a secret message and modifies it what violation is it?
Integrity violation, Data integrity
What is Data Integrity?
Assurance that data received is sent by someone trusted.
What is origin integrity
The source of the data is trustworthy
What is DAD?
Disclosure, Alteration, Destruction
What three main aspects of security does ITU-T X.800 consider?
Services
Attacks
Mechanisms
What is a Passive attack?
An attack that does not involve the modification of systems or data.
What types of passive attacks are there?
Eavesdropping
Traffic Analysis
How do we protect against traffic analysis?
Traffic padding