Topic 4 Reset Flashcards

(60 cards)

1
Q

The process of making and using codes to secure the transmission of information

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“Kryptos”

A

Cryptology

Comes from the greek word meaning hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“Graphein”

A

Comes from the greek word meaning write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code breaking

A

Basic Terms

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of obtaining the original message from the encrypted message

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Code designing

A

Basic Terms

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be used to check the integrity of a message: that the message has not been changed

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The secret key is shared between two parties

A

Private key cryptosystems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The secret key is not shared and two parties can still communicate using their public keys

A

Public key cryptosystems/ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1 key (private key)

A

Symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 keys (public and private key)

A

Asymmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Is a substitution cipher, named after Julius Caesar
  • Key = 3
  • Replaces each letter by the 3rd letter
A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Each letter is translated into the letter a fixed number of positions after it in the alphabet table

A

Caesar Cipher Operation principle:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

replaces one symbol with another

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • A message in its natural format readable by an attacker
  • Original message or data (also called cleartext
A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Message altered to be unreadable by anyone except the intended recipients

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transforming the plaintext under the control of the key

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sequence that controls the operation and behavior of the cryptographic algorithm

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transforming the ciphertext back to the original plaintext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Encrypts one fixed length group of bits at a time - SIZE is predetermined
  2. The block size is a fixed size - 64, 128, 256, 512, bit blocks
  3. Require padding to short blocks before encryption
  4. Used for symmetric encryption not asymmetric
A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Are fast and easy to implement in hardware
  2. Encryption is performed 1 bit or 1 byte at a time
  3. Mixes plaintext with key stream
  4. Either using Symmetric Key or Public Key
  5. The starting state should never be the same twice — uses initialization vector
A

Stream Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Are stronger but slower and often implemented in hardware
  2. One or large block at a time
  3. Substitution and transposition
A

Block Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Stream Ciphers
  2. Block Ciphers
A

Types of Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Electronic Codebook (ECB)
  2. Cipher Block Chaining (CBC)
  3. Counter (CTR)
A

Block Cipher Mode Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
1. Key to ciphertext relationship is very complicated 2. Key cannot be determined on the ciphertext
Confusion
26
1. The simplest encryption mode 2. Each block is encrypted with the same key—identical plaintext block created identical cipher block
Electronic Codebook (ECB)
27
1. Easy to implement 2. Each plaintext block is XORed with the previous ciphertext block 3. Adds additional randomization 4. Uses initialization vector for the first block
Cipher Block Chaining (CBC)
28
1. Block cipher mode - acts like a stream cipher 2. Encrypts using the values of the counter - 0, 1, 2 etc 3. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block
Counter (CTR)
29
# Cryptology Comes from the greek word meaning hidden
“Kryptos”
30
# What is Cryptography Includes:
1. Techniques for making sure that encrypted messages are not modified en route 2. Techniques for secure identification/authentication of communication partners
31
# What is Cryptography Refers to:
1. The practice and study of encryption 2. Transforming information in order to prevent unauthorized people from reading it
32
Cryptanalysis
The process of obtaining the original message from the encrypted message
33
Comes from the greek word meaning write
"Graphein"
34
Cryptography
The process of making and using codes to secure the transmission of information
35
1. Output should be different from the input 2. Change 1 bit of the input, at least 50% of the output should change
Diffusion
36
# Basic Terms Cryptography
Code designing
37
# Basic Terms Cryptanalysis
Code breaking
38
Digest
can be used to check the integrity of a message: that the message has not been changed
39
Private key cryptosystems/ciphers
The secret key is shared between two parties
40
Public key cryptosystems/ciphers
The secret key is not shared and two parties can still communicate using their public keys
41
Symmetric cipher
1 key (private key)
42
Asymmetric cipher
2 keys (public and private key)
43
Caesar Cipher
* Is a substitution cipher, named after Julius Caesar * Key = 3 * Replaces each letter by the 3rd letter
44
Caesar Cipher Operation principle:
Each letter is translated into the letter a fixed number of positions after it in the alphabet table
45
Substitution cipher
replaces one symbol with another
46
Plaintext
* A message in its natural format readable by an attacker * Original message or data (also called cleartext
47
Ciphertext
Message altered to be unreadable by anyone except the intended recipients
48
Encryption
Transforming the plaintext under the control of the key
49
Key
Sequence that controls the operation and behavior of the cryptographic algorithm
50
Decryption
Transforming the ciphertext back to the original plaintext
51
Types of Cryptography
1. Stream Ciphers 2. Block Ciphers
52
Stream Ciphers
1. Are fast and easy to implement in hardware 2. Encryption is performed 1 bit or 1 byte at a time 3. Mixes plaintext with key stream 4. Either using Symmetric Key or Public Key 5. The starting state should never be the same twice — uses initialization vector
53
Block Ciphers
1. Are stronger but slower and often implemented in hardware 2. One or large block at a time 3. Substitution and transposition
54
What is a Block Cipher?
1. Encrypts one fixed length group of bits at a time - SIZE is predetermined 2. The block size is a fixed size - 64, 128, 256, 512, bit blocks 3. Require padding to short blocks before encryption 4. Used for symmetric encryption not asymmetric
55
Confusion
1. Key to ciphertext relationship is very complicated 2. Key cannot be determined on the ciphertext
56
Diffusion
1. Output should be different from the input 2. Change 1 bit of the input, at least 50% of the output should change
57
Block Cipher Mode Operations
1. Electronic Codebook (ECB) 2. Cipher Block Chaining (CBC) 3. Counter (CTR)
58
Electronic Codebook (ECB)
1. The simplest encryption mode 2. Each block is encrypted with the same key—identical plaintext block created identical cipher block
59
Cipher Block Chaining (CBC)
1. Easy to implement 2. Each plaintext is block is XORed with the previous ciphertext block 3. Adds additional randomization 4. Uses initialization vector for the first block
60
Counter (CTR)
1. Block cipher mode - acts like a stream cipher 2. Encrypts using the values of the counter - 0, 1, 2 etc 3. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block