Week 3 Flashcards
(20 cards)
What is cryptography?
A way of turning plaintext (secret message) into ciphertext (unreadable form) that can be reverted back to plaintext
What four elements does encryption link together?
Plaintext m, ciphertext c, key k, algorithm E (so c = Eₖ(m))
State one principle of modern cryptography
Security depends only on secrecy of the key, not the algorithm (Kerckhoff’s principle)
What does “small change in plaintext results in large change in ciphertext” help resist?
Differential and statistical attacks by ensuring avalanche effect
Symmetric vs. Asymmetric Encryption: Which uses the same key for both encrypting and decrypting?
Symmetric encryption uses the same secret key for both operations.
What is the main drawback of symmetric key cryptography?
Key distribution problem: n parties need n(n-1)/2 unique keys.
How does asymmetric (public-key) encryption work?
Uses a key pair: public key to encrypt, private key to decrypt; enables digital signatures
What hybrid approach combines symmetric and asymmetric cryptography?
Use asymmetric to exchange a symmetric session key, then use symmetric for bulk data encryption
Describe the Caeser cipher encryption and decryption process
Encrypt by shifting each letter forward by k (mod 26); decrypt by shifting back by k
What’s the difference between substitution and transposition ciphers?
Substitution replaces symbols; Transposition rearranges symbol positions
Give an example of a monoalphabetic and a polyalphabetic cipher
Monoalphabetic: Simple substitution;
Polyalphabetic: Vigenère Cipher
What are the block size and key size of DES?
64-bit block size; 56-bit key
How does Triple DES (3DES) extend DES?
Applies DES three times with multiple keys to lengthen effective key size
Which algorithm replaced DES and 3DES as the NIST standard in 2001?
AES (Rijndael)
What problem does the Diffie-Hellman key exchange solve?
Securely establishing a shared symmetric session key over an insecure channel
Name two standard protocols that use DH for key establishment
TLS/SSL (Transport Layer), IPSec (Network Layer)
Who developed RSA and in what year?
Rivest, Shamir & Adleman in 1978
What are the core steps of “textbook” RSA key setup?
Choose primes p, q; compute n = p·q; derive e and d; publish (n,e), keep d secret
State the RSA encryption and decryption formulas
Encryption: c = mᵉ mod n; Decryption: m = cᵈ mod n
How can RSA be used for digital signatures?
Sign by “encrypting” a hash with the signer’s private key; verify with their public key