Serious Cryptography Flashcards
How many letters does cesar cypher shift?
3
How do vigenere cipher works?
The key is not fixed like cesar, is defines a key using a word of N letters. This word is used to rotate every letter individually: CRYPTO encrypts to FLFSNV using DUH key.
What are the steps needed to break vigenere cipher?
1- find the key length: find for repeated sequences of letters in the ciphertext.
2- determine the key using frecuence análisis: Most common letters of abecedary.
Does classic ciphers operates with bits or letters?
Letters
In symmetric ciphers, what is a permutation?
A function that transform an item (letter or set of bits ) such that item has a unique inverse.
In symmetric ciphers, what is a mode of operation?
An algorithm that uses a permutation to process messages of arbitrary size. Mitigates exposure of duplicate letters in the plaintext by “scrumbling” all. (Confussion and difussion)
What is a substitution cipher?
Replace letters with other letters
When a permutation is secure?
When it satisfy 3 criteria:
1- The permutation should be determined by the key. ( in caesar is fixed and is 3)
2- Different keys should result in different permutations.
3- The permutation should look random. Knowing that A encrypts to B should not give you any other information.
Why classical ciphers are insecure?
Because their are limited to operations that humans can perform with their head.
Which cipher guaranties perfect secrecy?
One Time Pad
What is the length of a one time pad cipher
as long as the message
What an attacker can learn from a ciphertext computed with a one time pad?
The length of the message
How many times can use a single key on one time pad?
Just once
Why can´t we encrypt 2 message with the same key on one time pad?
Because of the XOR property. C1-xor-C2=(P1-xor-K)xor(P2-xor-K)=P1-xor-P2-xor-K-xor-K=P1-xor-P2
Why One time pad is not used on real life?
Because to encrypt a 1 tera file you will need a 1 tera key. Is not applicable for long messages.
Why is one time pad secure?
Shannon proof that if the key K is chosen randomly and that key is as long as the message, an attacker, even if he can proof all the possible keys, will now know nothing about the message, because it will have tons of valid messages.
What is an attack model?
Assumptions about what an attacker can do to interact with a cipher. Does not have to reality exactly, is an approximation.
What is a security goal?
Descriptions of what is considered a successful attack.
What kerchoffs principle states?
The security of a cipher should rely only on the secrecy of the key and not on the secrecy of the cipher.
What are the black box attack models ?
Models where the atacker only see what goes in and out the cipher.
What is Ciphertext-only attack model?
Passive attack, can´t perform decrypt and encrypt queries. JUST OBSERVE CIPHERTEXTS.
what is Known-plaintext attack model?
Passive attack, can´t perform decrypt or encrypt queries. OBSERVE CIPHERTEXTS AND THEIR ASOCIATED PLAINTEXTS. (the plaintexts are randomly chosen)
What is chosen-plaintext attack model?
Active attack. Can perform encryption queries of plaintext of their choise.
What is chosen-ciphertext attack model?
Active attack. Can perform encryption and decryption queries.