Lecture 5: Classical Encryption Part 1 (introduction, transposition ciphers, simple substitution ciphers, Caesar cipher, random simple substitution cipher) Flashcards

1
Q

What are the two facets of cryptology?

A
  1. cryptography

2. cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cryptography?

A

study of designing cryptosystems

science of secret writing

transformations of data depending on a secret (key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cryptanalysis?

A

study of breaking cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cryptography used to provide?

A
  1. confidentiality

2. authentication (or integrity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is confidentiality in terms of cryptography?

A

key is needed to read mesage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authentication in terms of cryptography?

A

key is needed to write message (with digital signature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a cryptosystem consist of?

A
  1. Set of plaintexts (holding original message)
  2. Set of ciphertexts (holding encrypted message)
  3. Set of keys
  4. Function → encryption/encipherment → transforms plaintext into ciphertext
  5. Inverse function → decryption/decipherment → transforms ciphertext back into plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for ciphertext?

A

cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main characteristics of a symmetric key cipher?

A
  • Encryption and decryption keys knowing ONLY to sender & receiver
  • Secure channel for transmission of keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are main characteristics of an asymmetric key cipher?

A
  • Each participant has public key & private key

* Possibly working for both encryption of messages and creation of digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is another name for a symmetric key cipher?

A

secret key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is another name of an asymmetric key cipher?

A

public key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the notation for an encryption function for a symmetric encryption algorithm?

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the notation for an decryption function for a symmetric encryption algorithm?

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the notation for a message/plaintext for a symmetric encryption algorithm?

A

M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the notation for a cryptogram/ciphertext for a symmetric encryption algorithm?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the notation for a shared secret key for a symmetric encryption algorithm?

A

K

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is encryption denoted as for a symmetric encryption algorithm?

A

C = E(M,K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is decryption denoted as for a symmetric encryption algorithm?

A

M = D(C,K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some resources available to an adversary?

A
  • computational capability

* system inputs/outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What may the adversary’s goal be?

A
  • retrieving whole secret key
  • distinguishing two messages (e.g. YES and NO) → may want to send message rather than control system and this may be enough info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is exhaustive key search?

A

Try all possible keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can you prevent exhaustive key search?

A

No, so all cryptosystems must have enough keys to make search too difficult computationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is it possible that an adversary finds key without trying exhaustive key search?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is it possible that an adversary breaks cryptosystem without finding key?

A

Yes, e.g. ciphertext may leak info about key

26
Q

What is a minimum standard for a cryptosystem?

A

Prevention of exhaustive search

27
Q

What is the ciphertext only attack?

A

attacker has access to ONLY intercepted ciphertexts

28
Q

What is the known plaintext attack?

A

attacker knows a small amount of plaintexts and their corresponding ciphertexts

29
Q

What is the chosen plaintext attack?

A

attacker can obtain ciphertext from some plaintext that it has selected (attack has “insider encryptor” available who helps trigger attack)

30
Q

What is the chosen ciphertext attack?

A

attacker can obtain plaintext from some ciphertext that is has selected (attack has “inside decryptor” available who decrypts attacker’s chosen ciphertext)

31
Q

When is a cryptosystem seen as highly insecure?

A

if it can be practically attacked using only intercepted ciphertexts

32
Q

What attacks should a cryptosystem be secure against?

A

chosen plaintext and chosen ciphertext attacks

33
Q

What sort of attack is practical for an attacker?

A

ciphertext attacks

34
Q

What is Kerckhoffs’ Principle?

A

attacker has complete knowledge of ciphertext i.e. decryption key is only item unknown to attacker

35
Q

What is using a secret, non-standard algorithm an example of?

A

security through obscurity

=> severe problems

36
Q

What do statistical attacks depend on?

A

using redundancy of alphabet

37
Q

What info helps in a statistical attack?

A

distribution of single letters, diagrams (double letters) and trigrams (triple letters)

38
Q

What are the most frequent letters (including space) in English (top 3)?

A

space
E
N

39
Q

What are the most frequent digrams in English?

A

E + space

space + A

40
Q

In terms of transposition ciphers, what two operations do historical ciphers combine?

A

transposition

substitution

41
Q

Define the transposition operation

A

characters in plaintext mixed up with each other (permuted) → limited to plaintext’s alphabet

42
Q

Define the substitution operation

A

each character (resp. set of characters) replaced by different character

43
Q

Explain how transposition ciphers work

A
  • Permuting characters in fixed period d and permutation f
  • Plaintext seen as a matrix of rows of length d
  • Permuting rows/cols and outputting in row/col order
  • E.g. permutation of rows and outputting in column order
  • Number off cols in random order → x cols have x! possible keys

https://www.youtube.com/watch?v=sHsnH1u03e4

44
Q

Explain simple transposition cipher

A
  • Key → (d,f)
  • Each block of d characters is re-ordered using permutation f
  • d! permutations of length d → d x (d - 1) x (d-2) x … x 2 x 1 → take ball without replacement i.e. one less permutation choice
45
Q

How can we identify a transposition cipher?

A

Frequency distribution of ciphertext = frequency distribution of plaintext characters

46
Q

Can we solve transposition ciphers by hand if d is small? If so, how?

A

Yes, using anagramming

47
Q

What is anagramming?

A

restoring disarranged characters to original position

48
Q

How can you optimize the trials for attempting to solve a transposition cipher?

A

Knowledge of plaintext language diagrams and trigrams

49
Q

How can we speed up the process of solving a transposition cipher?

A

automate the process

50
Q

Compare the permutation done in a transposition and substitution cipher

A

Transposition ciphers permutes PLAINTEXT chars while substitution ciphers permute ALPHABET chars

51
Q

What is the general idea of a simple substitution cipher?

A

each char in plaintext alphabet replaced b character in ciphertext alphabet following substitution table

52
Q

What is a simple substitution cipher also called?

A

monoalphabetic substitution cipher

53
Q

Explain the Caesar cipher

A

Moving ith letter of alphabet to (i+j)th letter s.t.c key is j → every char moved by j positions to right

54
Q

What is the encryption function for the caesar cipher?

A

Ci = (Mi + j) mod n

55
Q

What is the decryption function for the caesar cipher?

A

Mi = (Ci - j) mod n

56
Q

What is n in the caesar cipher?

A

Either n = 26 or n = 27 (includes space) → size of alphabet

57
Q

How do you perform cryptanalysis on caesar cipher?

A

Finding where one of the most frequent chars is shifted to –> count freqs –> trial mapping

58
Q

Explain how the random simple substitution cipher works

A

Assigning random char of alphabet to another char in alphabet

59
Q

How are encryption and decryption defined as for random substitution cipher?

A

defined by substitution table that randomly permutes alphabet

60
Q

How many keys if random substitution cipher alphabet has 26 chars?

A

26! keys

if say A=C, then can’t assign A again → selection without replacement

61
Q

What is caesar cipher a special case of?

A

substitution cipher

62
Q

Can you do frequency analysis for random substitution cipher?

A

Yes, but solving by hand is tedious → many trials and errors