LECTURE NOTE 3 Flashcards
(99 cards)
what is the handshake protocol
broswer and web server, establish a shared secret key using public-key crytography (either the RSA or the Diffie-Hellman key exchange )
How does file encryption work in practice?
Files are symmetrically encrypted with a secret key; the key is stored encrypted or in secure hardware, and a password unlocks the key for decryption
Structured approach to identifying and assessing potential threats and
vulnerabilities within a cryptographic system
threat model
What is the main threat model element in cryptography?
Identifying adversaries, their motives, capabilities, knowledge, attack vectors, and countermeasures.
The security of a cryptosystem depends
on the strength of the algorithm and the secrecy of the key
Kerckhoff’s Principle (1883):
What are the two main types of modern cryptography?
symmetric crytography and public key (asymmetric) crytography
Conventional encryption, secret-key encryption, single-key encryption are other names for
symmetric encryption
What are the two requirements for secure symmetric encryption?
A strong encryption algorithm and secure key distribution.
What are the five ingredients of symmetric encryption?
Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.
What is the most widely used type of encryption before public-key cryptography?
Symmetric (secret-key) encryption.
What is the simplified model of symmetric encryption?
Encrypt plaintext with a secret key to get ciphertext; decrypt ciphertext with the same key to get plaintext.
What is the main difference between symmetric and public key cryptography?
Symmetric uses the same key for encryption and decryption; public key uses different keys.
Encrypts data one bit or byte at a time using a pseudorandom keystream and bitwise operations like XOR
stream cipher
What is a keystream in a stream cipher?
A pseudorandom sequence generated from a key, combined with plaintext to encrypt each character
What is an example of a stream cipher?
one - time pad
How is a keystream generated in a stream cipher?
A shared key is input to a bit-stream generator algorithm, which produces the keystream for encryption
What is a block cipher?
Encrypts a fixed-size block of plaintext to produce a block of ciphertext of the same size
What happens if you have a partial block in block cipher encryption?
Padding is used to fill the block
How do block ciphers handle messages longer than one block?
They use modes of operation to apply encryption to larger plaintexts.
What are typical block sizes in block ciphers?
64 or 128 bits
What are key design parameters for a block cipher?
Block size and key size; the key is usually a k-bit binary string, with keyspace size
2^K
who introduced the concepts of confusion and diffusion in cryptography
claude shannon
How is confusion achieved in encryption?
By applying complex substitution algorithms
what is confusion in block cipher
It hides the relationship between the ciphertext and the key, making it hard to deduce the key from ciphertext