P2L5 Intro to Cryptograph Flashcards

1
Q

Attacks on Encryption

A
  • Brute-force attack (try all keys)
  • Crypto-analysis - analyze algorithms and data
  • Implementation attack - side channel analysis, example observer power consumption of crypto system to determine value
  • social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

One-to-one mapping which creates cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be kept secret?

A

Encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Cryptography

A
Secret Key (one key for encrypt/decrypt)
Public Key(two keys, public for encryption, private for decryption. Also use for signing.
Hash Function - data of any size transformed to fixed length output (128-512 bits)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash Function Features

A

Easy to compute H(m)
H(m), no easy way to find m
one-way function
Given m1, it is computationally infeasible to find m2!=m1 such that H(m1)=H(m2) (weak collision resistant)
Or
Computational infeasible to find m1!=m2 s.t. H(m1) = H(m2)
(strong collision resistant)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly