LECTURE NOTE 2 Flashcards

(57 cards)

1
Q

making secret messages; The practice of creating secret messages by transforming plaintext (an ordinary readable message) into ciphertext (secret messages that are
difficult to interpret)

A

crypotography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

breaking secret messages
The process of deciphering secret messages, involving the recovery of plaintext from ciphertext without possessing the key. Also called code breaking

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The combined art and science of both creating and
deciphering “secret codes”.
It encompasses cryptography and cryptanalysis, representing the broader
field of secure communication techniques.

A

cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

term that serves as a synonym for any or all of the
aforementioned concepts, with the precise meaning determined by the
context in which it is used.

A

Crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the cryptographic systems are generally classified along three independent
dimensions

A

type of operations used for encryption, number of keys used, processing of plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the types of operations used for encryption

A

substitution, transposition, product systems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are different types of number of keys used

A

symmetric, asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the different types of processing of plaintext

A

block cipher, stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

each element in the plaintext is mapped into another element

A

substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

elements in plaintext are rearranged

A

transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

multiple stages/combinations of substitutions and
transposition

A

product systems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sender and receiver use same key

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sender and receiver each use a different key

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

operates on input data in fixed-size blocks. Processes each
block independently, generating an output block

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

process the input elements continuously, producing output
element one at a time, as it goes along

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

only to the sender and receiver, is a critical
component of the encryption/decryption processes.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a particular algorithm (cryptographic system)

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

original message

A

plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

encrypted or coded message

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

convert from plaintext to ciphertext (enciphering)

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

restore the plaintext from ciphertext (deciphering)

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

critical information used in cipher known only to sender/receiver

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

cryptosystem uses the same key to encrypt as to decrypt

A

symmetric key

24
Q

cryptosystem uses a public key to encrypt and a
private key to decrypt

A

public/Asymmetric

25
composition and ordering of the exchanged messages
protocol
26
What is a symmetric cryptosystem (private-key system)?
A system where the same key is used to both encrypt and decrypt messages. Correctness: Decrypting an encrypted message with the right key gives back the original message. Security: It’s hard to decrypt the message without the key.
27
kerckhoff's principle
one should always assume that the adversary know the enryption/decryption algorithms and the resistance of the cipher to attacks must be based on only the secrecy of the key
28
brute-foce attack
Try every possible key on ciphertext until readable text is obtained from the ciphertext On average, number of guesses is half the key space
29
use knowledge of algorithm and/or plaintext patterns to “intelligently” decipher the ciphertext Exploit characteristics of algorithm to deduce plaintext or key Attacks differ based on amount of information known to attacker
Cryptanalysis
30
the set of all possible keys that can be sued to generate a key
keyspace
31
process of attempting to discover the plaintext or key
cryptanalysis
32
what is a ciphertext-only attack?
an attacker only knows the ciphertext and tries to recover the plaintext or key
33
what is a Known Plaintext Attack ?
an attacker knows some plaintext-ciphertext and tries to recover the plaintext of another ciphertext
34
how can a known plaintext attack happen?
when an attacker learns or guesses plaintexts, such as from public releases or guessable message headers
35
what is a chosen plaintext attack?
An attacker chooses plaintexts to be encrypted and gets the corresponding ciphertexts.
36
What is a chosen ciphertext attack?
An attacker chooses ciphertexts to be decrypted and gets the corresponding plaintexts.
37
What is an adaptive chosen text attack?
An attacker chooses each plaintext or ciphertext based on previous results, making the attack more powerful.
38
What is computational security in encryption?
Encryption is secure if breaking it with current technology and resources is not feasible in a practical timeframe.
39
What is perfect (information-theoretic) security?
Encrypted data reveals no information about the plaintext, regardless of the attacker’s computational power (e.g., one-time pad).
40
all cassical ciphers are _______
symmetric
41
exhaustive key search
try all possible keys and test to see if correct ; large keyspace prevents/helps against but it not sufficient
42
what are substitution ciphers?
most common form of cipher; work by replacing each letter of the plaintext with another letter or even a random symbol. the most famous one is caesar cipher
43
mono-alphabetic substitution (fixed replacement structure )
same letter is replaced with only one other ( always the same for given cipher message )
44
caesar code decryption
Deciphering is done in reverse, with a left shift of 3. Replaces a letter another with an inverse alphabet shift: a previous letter in the alphabet
45
shift cipher
shift by the number of postions. so the key is the number of postions to shift to
46
a type of substitution cipher in which the mapping of the plaintext letters to ciphertext letters is an arbitarty permutation of the alphabet; 26! possible permutation key(s)
permutation cipher
47
the study of the frequency of letters or groups of letters in a ciphertext; technique based on the idea that certain letters or letter combinations appear more frequently in a given language
frequency analysis
48
what are transposition ciphers
the name given to an ecryption that involves rearrnaging the plaintext letters in a new order
49
simple transposition
The key to the cipher is the number of rows and columns of a matrix. Encipher a message by writing the plaintext into the matrix by rows and reading the ciphertext out of the matrix by columns.
50
a fundamental property of secure ciphers that aims to obscure the relationship between the ciphertext and the key; o leaks of information. You should not be able to find patterns
confusion
51
refers to the process of spreading the influence of each plaintext element over a large portion of the ciphertext
diffusion
52
another way to strengthen substitution ciphers by using different substitutions for different letter positions.
poly-alphabetic ciphers
53
a polyalphabetic cipher in which the number of different substitutions r is also part of the key
Vigenère cipher
54
when is cryptosystem secure and insecure
secure - best known attack is unknown insecure - any shortcut is known
55
is it possible to make a completely unbreakable crytosystem
The Vernam cipher (one-time pad)
56
rules of the one-time pad, which cannot be bronek if it used correctly
1. The key is as long as the message. 2. The key is random. 3. The key is never reused.
57
two drawbacks of one-time pad
1. The key k must be as long as the message to be encrypted. 2. The same key must never be used more than once. (Hence the term “one-time”.)