Week 4 Flashcards

1
Q

What is Cryptography?

A

The science of secret writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptanalysis?

A

The science of code-breaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cipher?

A

An algorithm that changes plain text to cipher text. This process is called encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If the key range is small the cipher is not…..enough (fill in the blanks)

A

Stringent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Kerckhoff’s Principle?

A

The principle that only keys are secret and everything else is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is secret key cryptography? (symmetric key)

A

Same key for encryption and decryption (to be kept secret)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is public key cryptography? (asymmetric key)

A

Provides a public key and a private key for each party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List 3 properties of public and private keys

A

1- Easy to generate
2- Easy to encrypt knowing the public key
3- Easy to decrypt knowing the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Hybrid systems?

A

First, the two parties use an asymmetric cipher to negotiate a session key then, encrypt the conversation using the session key as a secret key of a symmetric cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of attacks on ciphers?

A
  • Brute force

- Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Brute force attack?

A

One that where the attacker tries all possible keys one by one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is substitution?

A

Replace characters of plaintext with other characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is transposition?

A

Rearranging the order of plaintext characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is steganography?

A

Concealing existence of a message (its not secure though) e.g. behind images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Unconditionally secure cipher?

A

One where the ciphertext does not contain enough

information to determine uniquely the plaintext (impossible to break)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Conditionally secure cipher?

A

cost of breaking exceeds the value of encrypted

info, or time to break which in turn exceeds useful lifetime of encrypted info (takes a lot of money/time to break)

17
Q

What is a Monoalphabetic cipher?

A

One where each symbol in the input is mapped to a fixed symbol in the output

18
Q

What is a Polyalphabetic cipher?

A

Any cipher based on substitution, using multiple substitution alphabets.

19
Q

What is a non self-synchronising cipher?

A

One where the stream cipher internal state changes independently of the plaintext or ciphertext messages

20
Q

What is a self-synchronising cipher?

A

One where stream ciphers update their state based on previous ciphertext digits