Final Deck Flashcards
(128 cards)
What are the four kinds of attackers?
- Rogue hackers
- Organized crime
- Insider threat
- Nation states
Rogue hackers
Hackers not affiliated with an organized group. Usually hacking on a moral basis or political agenda.
Doxxing
The practice of revealing private information publicly
Organized crime
Organized group attacking bigger targets. Ex. Bank theft, SWIFT hack.
Insider threat
Threat of hacker working within a corporation. Ex. Edward Snowden
Nation states
Countries using their resources to attack another country or corporation. Ex. Stuxnet.
What are the four aspects of good cryptography?
- Confidentiality
- Integrity (ensure contents haven’t been tampered with)
- Authenticity (prove who a message came from / who performed transaction)
- Non-repudiation (ensure party can’t back out of a transaction)
True or false: IP packets are encrypted by default
FALSE! They’re plaintext, like sending a postcard.
True or false: My computer’s communication is by default broadcast across the entire network.
True! Like the old telephones. Our computers can run in promiscuous mode and record other packets.
How was crypto classified historically?
As a munition until the 1990s when businesses needed to be able to encrypt their data.
What is the idea of crypto wars?
Gov wants special access to tech, and companies believe this makes the tech less secure. Ex. San Bernadino shooter –> FBI asking for backdoor.
Cryptography vs. cryptanalysis
Cryptography is the science of creating uncrackable codes. Cryptanalysis is the science of cracking them. Cat and mouse game!
Cryptology
Umbrella term covering cryptanalysis and cryptography
Steganography
The art of concealing information (NOT encrypting).
If I shave CJ’s head and write a message to her parents on her scalp, which “-ography” am I using?
Steganography. The information is hidden, but not encrypted.
If I write a secret letter to nacho in lemon juice and scramble the letters using a key, which “-ography” am I using?
Both steganography (writing in lemon juice) and cryptography (scramble the letters).
What are the two types of cryptography?
Substitution and transposition
I want to see Jeremy at Koelbel at 4:30. I write a letter to him saying “Teme ta lebelok ta rofu iytrhit” what type of cryptography am I using?
Transposition! I didn’t substitute any letters, I just moved them around.
Using substitution of a mod 28 alphabet and key = 15, what does the word “rat” become?
r (18) + 15 = 33 - 28 = 5
a (1) + 15 = 16
t (20) + 15 = 35 - 28 = 7
epg
Scytale
A stick with a certain number of sides. Wrap leather band with letters around stick to see message
A scytale is a form of ancient (transposition/substitution)
Transposition
How does the Caesar cypher differ from the Vignere cypher?
The Caesar cypher is much simpler and uses a fixed key to substitute letters. The Vignere cypher changes each letter differently.
What was Claude Shannon’s discovery?
He demonstrated that substitution and transposition, sufficiently combined, yield encrypted data that is indistinguishable from random data.
What is Kerckhoff’s Principle for encryption?
The secret is in the key, not the algorithm. Think of a door lock! It doesn’t matter if you know who makes the lock.