Symmetric Encryption: Substitution Flashcards

1
Q

What are the 4 types of substitution ciphers?

A

Mono-alphabetic, Poly-alphabetic, Transposition, Composite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Mono-alphabetic substitution…

A

A message is encrypted via a character shift across all characters in the message. The character shift is the key. The result is a permutation of the original message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is mono-alphabetic substitution vulnerable?

A

Frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Poly-alphabetic substitution…

A

A block cipher in which every block of the plain text has a unique key (random character shift applied to it). For example, block 1 may have a key of 3, block 2 may have a key of 7 etc. This ensures that characters in the cipher text don’t all map to the same characters in the plain text. Thus, reducing vulnerability to frequency analysis. In essence, this substitution consists of many different caesars ciphers working on the different plain text blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of a famous poly-alphabetic substitution and explain how it works…

A

Vingere cipher - In this cipher, a key is chosen and repeated to be the same length as the plain text. This means each key value maps to a plain text value. Then, for each mapping, the numeric values are added and then modulo the length of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of Vingere cipher?

A

It gives uniform uniqueness across the cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a disadvantage of Vingere cipher?

A

The use of a repeating key still leaves some vulnerability to frequency analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the One Time Pad?

A

Aka, Vernam Cipher. A cipher in which each character of plain text is encrypted by a unique key. In more detail, the key and plain text are converted to binary values, and each mapping is XORd. The key is discarded once the encryption / decryption process is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the OTP considered unbreakable? If so, why?

A

Yes, it’s considered mathematically unbreakable due to the notion of it being truly random (if this is actually possible).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the core aspects of the Vernam cipher?

A
  1. The key is only used once for encryption and decryption, then it’s discarded.
  2. Key must be truly random (if that’s possible)
  3. Binary values of the key must be the same length as the binary values of the plain text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the pros and cons of OTP?

A

Pros:
- Mathematically unbreakable due to randomness.
- XOR is very efficient on modern operating systems, therefore, encryptions and decryption process is very fast.
- Keys are discarded, therefore, no replay attacks.
Cons:
- Key generation is required for every communication run.
- Key distribution - It’s not practical to frequently exchange large keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Transposition Cipher

A

Ciphers that use only permutations to hide the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What was the earliest transposition cipher?

A

Scytale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name a modern Transposition Cipher. Explain how it works…

A

Row Column cipher.
A number of columns are chosen for a table, and the message is written in the table. The columns are then uses as cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key in the Row Column transposition cipher?

A

The column count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Composite Cipher

A

These are a combination of substitution and transposition ciphers.

17
Q

What is a product cipher?

A

A chain of composite ciphers.

18
Q

Define a homophonic substitution cipher…

A

A substitution cipher in which each each plain text symbol maps to multipe cipher text symbols. This reduces vulnerability to frequency analysis.