Introduction Flashcards

(41 cards)

1
Q

What is a symmetric encryption

A
  • both parties have the same key to decrypt and encrypt a message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the mayor problem with symmetric encrytion?

A
  • Both parties need the key before they can use the system -> key needs to be send unencrypted -> attacker can read blank key and also use it
  • So symmetric encryption needs an alreay established secure connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of encryption system do we use if we do not have a secure connection?

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does asymmetric encryption work?

A
  • Encryption and decryption method have different keys
    1. Send encryption method to partner, but keep the decryption key
    2. partner encrypts message with encryption method
    3. partner sends encrypted message to you
    4. You decrypt it with the decryption key.
  • its like sending an unlocked lock, your partner uses that lock to lock the message. You use your key to unlock the lock again
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In an asymmetric system, how is the encryption key called?

A

public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In an asymmetric system, how is the decryption key called?

A

secret key, private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Kerchoff’s Principle (Open Design)

A

The encryption and decryption methods can be publicly known. Only the private key needs to stay a secrekt, in symmetric systems also the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we call systems where the encryption key is equals to the decryption key?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we call systems where the encryption key is different from the decryption key?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the definition of a Cryptosystem?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a CO (Ciphertext Only) Attack?

A

You only receive encrypted messages like:

ciphertext_1, ciphertext_2, ...

Goal is to find out the original messages or even the secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a KP (Known Plaintext) Attack?

A

You receive messages and their encrypted versions:

("Hello", c1), ("Yes", c2), ...

Goal is to learn the encryption and break new ciphertexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a CPA (Chosen Plaintext Attack) Attack?

A

You choose any messages m you want to encrypt and get the encrypted versions -> try go learn the encryption and break new ciphertexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a CCA1 (Chosen Chipertext Attack before challenge) Attack?

A

Before attacking, you are allowed to decrypt any ciphertext you want except the final ciphertext. Then you get the final ciphertext and you need to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a CCA2 (Adaptive Chose Ciphertext Attack after challenge) Attack?

A

You can keep decrypting messages, even after getting the challenge ciphertext, just not that specific ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the OW (One Wayness) success for an cryptographic attack?

A

You are able to decrypt a ciphertext and get the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the NM (Non Malleability) success for an cryptographic attack?

A

Even if you can’t read the message, you can modify the ciphertext so that it decrypts to a different, meaningful message.

18
Q

What is the PA (Plaintext Awareness) success for an cryptographic attack?

A

You generate a ciphertext without knowing the original message, but it stil decrypts to something meaningful

19
Q

How does the IND-CCA2 Game - The Gold Standart - works?

A
  1. A key is generated and hidden
  2. You choose two messages: m0 and m1
  3. One of them is randomly chosen and encrypted: ` c = enc(mb) `
  4. You get c
  5. You can ask for the decryption of any ciphertext except c
  6. Guess: was c the encryption of m0 or m1?
19
Q

What is the IND (Indistinguishability) success for an cryptographic attack?

A

Given two messages and an encryption of one of them, can you guess better than random which one of these messages was encrypted?

20
Q

How does the addition and multiplication work in modular arithmethic?

The ring has the length n

A

as usual, just append mod n to every operation?

20
Q

What are the two dominant Public Key Cryptography methodes used today?

A
  • DH key exchange
  • RSA
21
Q

What is the negation -a of the number a in modular arithmetic?

A
  • -a is the number with a + (-a) = 0
  • -a = n - a for a > 0

-a = n - a -> -a + a = n -> 0 = n which is true because of mod n

22
Q

What is the multiplicative invers a^(-1) of the number a in modular arithmetic?

A

a^(-1) is the number with a * a^(-1) = 1

23
Does for every number a exists the mutiplicative invers a^(-1) in modular arithmetic?
No
24
Does for every number 0 < a < n exists the multiplicative invers a^(-1) in modular arithmetic with n prime?
Yes
25
What condition needs to be fullfiled between a and n for there to be a multiplicative invers of a in modular arithmetic?
the greatest common devisor needs to be one, so: gcd(a, n) = 1
26
How can i get the negative number in a modern CPU (aka modular arithmetic)
27
What function do we need in modular arithmetic but is realy time complex?
division/multiplicative inverse in Z\_p (or Z\_n, if possible)
28
What is the theorem of the extended euclidian algorithm.
29
What is the EEA (Extended Euclidian Algorithm):
``` def EEA(a,b): if b == 0: return (a,1,0) d,s,t = EEA(b, a % b) return (d, t, s - (a//b) * t) ```
30
How do i calculate the mutiplicable inverse with the EEA
31
When are two numbers coprime?
When their greatest common divisor (gcd) is 1.
32
What is the Chinese Remainder Theorem (CRT)
33
What is the algorithm to combine two system lines of the chinese remainder theorem (CTR) ?
34
What is Fermat's little Theorem?
34
What is the corollary of Fermat's Little Theorem
35
What is Euler's Phi-Function?
36
What is the Generalised Fermat's Little Theorem?
37
For what values of n does the generalised fermat's little theorem become the normal fermat's little theorem?
n = p prime. Because then phi(n) = p-1
38
What is the prime-number-thorem?