Topic 4 Reset Flashcards
(60 cards)
The process of making and using codes to secure the transmission of information
Cryptography
“Kryptosâ€
Cryptology
Comes from the greek word meaning hidden
“Graphein”
Comes from the greek word meaning write
Code breaking
Basic Terms
Cryptanalysis
The process of obtaining the original message from the encrypted message
Cryptanalysis
Code designing
Basic Terms
Cryptography
can be used to check the integrity of a message: that the message has not been changed
Digest
The secret key is shared between two parties
Private key cryptosystems/ciphers
The secret key is not shared and two parties can still communicate using their public keys
Public key cryptosystems/ciphers
1 key (private key)
Symmetric cipher
2 keys (public and private key)
Asymmetric cipher
- Is a substitution cipher, named after Julius Caesar
- Key = 3
- Replaces each letter by the 3rd letter
Caesar Cipher
Each letter is translated into the letter a fixed number of positions after it in the alphabet table
Caesar Cipher Operation principle:
replaces one symbol with another
Substitution cipher
- A message in its natural format readable by an attacker
- Original message or data (also called cleartext
Plaintext
Message altered to be unreadable by anyone except the intended recipients
Ciphertext
Transforming the plaintext under the control of the key
Encryption
Sequence that controls the operation and behavior of the cryptographic algorithm
Key
Transforming the ciphertext back to the original plaintext
Decryption
- Encrypts one fixed length group of bits at a time - SIZE is predetermined
- The block size is a fixed size - 64, 128, 256, 512, bit blocks
- Require padding to short blocks before encryption
- Used for symmetric encryption not asymmetric
Block Cipher
- Are fast and easy to implement in hardware
- Encryption is performed 1 bit or 1 byte at a time
- Mixes plaintext with key stream
- Either using Symmetric Key or Public Key
- The starting state should never be the same twice — uses initialization vector
Stream Ciphers
- Are stronger but slower and often implemented in hardware
- One or large block at a time
- Substitution and transposition
Block Ciphers
- Stream Ciphers
- Block Ciphers
Types of Cryptography
- Electronic Codebook (ECB)
- Cipher Block Chaining (CBC)
- Counter (CTR)
Block Cipher Mode Operations