Week 3 Flashcards

(20 cards)

1
Q

What is cryptography?

A

A way of turning plaintext (secret message) into ciphertext (unreadable form) that can be reverted back to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What four elements does encryption link together?

A

Plaintext m, ciphertext c, key k, algorithm E (so c = Eₖ(m))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State one principle of modern cryptography.

A

Security depends only on secrecy of the key, not the algorithm (Kerckhoff’s principle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “small change in plaintext results in large change in ciphertext” help resist?

A

Differential and statistical attacks by ensuring avalanche effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric vs Asymmetric Encryption: which uses the same key for both encrypting and decrypting?

A

Symmetric encryption uses the same secret for both operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main drawback of symmetric key cryptography?

A

Key distribution problem: n parties need n(n-1)/2 unique keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does asymmetric (public-key) encryption work?

A

Uses a key pair: public key to encrypt, private key to decrypt: enables digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What hybrid approach combines symmetric and asymmetric cryptography?

A

Uses asymmetric to exchange a symmetric session key, then use symmetric for bulk data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the Caeser cipher encryption and decryption process.

A

Encrypt by shifting each letter forward by k (mod 26); decrypt by shifting back by k.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between substitution and transposition ciphers?

A

Substitution replaces symbols; transposition rearranges symbol positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an example of a monoalphabetic and polyalphabetic cipher.

A

Monoalphabetic: Simple substitution
Polyalphabetic: Vigenère Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the block size and key size of DES?

A

64-bit block size; 56-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the Triple DES (3DES) extend DES?

A

Applies DES three times with multiple keys to lengthen effective key size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which algorithm replaced DES and 3DES as the NIST standard in 2001?

A

AES (Rijndael)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What problem does Diffie-Hellman key exchange solve?

A

Securely establishing a shared symmetric session key over an insecure channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name two standard protocols that use DH for key establishment.

A

TLS/SSL (Transport Layer), IPSec (Network Layer)

17
Q

Who developed RSA and in what year?

A

Rivest, Shamir and Adleman in 1978

18
Q

What area the core steps of “textbook” RSA key setup?

A

Choose primes p, q; compute n = p·q; derive e and d; publish (n,e), keep d secret

19
Q

State the RSA encryption and decryption formulas.

A

Encryption: c = mᵉ mod n; Decryption: m = cᵈ mod n

20
Q

How can RSA be used for digital signatures?

A

Sign by “encrypting” a hash with the signer’s private key; verify with their public key.