Week 2 - History of Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

symmetric key algorithm

An encryption method where the same key is used for both encryption and decryption, ensuring that both parties have access to the same secret key.

2
New cards

key

a string of characters (determined randomly or mathematically) that’s used with a cryptographic algorithm to secure data

3
New cards

keyspace

a set of all possible keys an algorithm can use. For example AES-128 has 2^128

4
New cards

message space

a set of all possible messages that can be sent using a cryptographic scheme. It is also known as plaintext

5
New cards

cyphertext space

a set of all possible cyphertext from a cryptographic scheme

6
New cards

correctness

Required in symmetric encryption schemes and can be written as Dec(Enc(m, k), k) = m. It means that the algorithm encrypts and decrypts correctly with the same key

7
New cards

kerckhoffs’ principle

The idea that if an attacker knows everything about a cryptosystem, it is still secure as long as the attacker doesn’t know the key. Therefore secrecy of the key is…key (benefits include better transparency, algorithms can be brute-forced, keys are easier)

8
New cards

substitution cypher

this cypher substitutes a unit of plaintext (such as a letter) for a unit of cyphertext, based on a key

9
New cards

Caesar cypher

A historical substitution cypher where each letter in the plaintext is substituted a fixed number of places to get the cyphertext

10
New cards

permutation

all the possible rearrangements of a set (e.g. the alphabet has 26! possible arrangements)

11
New cards

frequency analysis

Using the frequency of letters, digraphs/trigraphs and doubles to break a substitution cypher

12
New cards

monoalphabetic

substitution cyphers where a plaintext letter always maps to the same cyphertext letter such as with the Caesar cypher

13
New cards

polyalphabetic

substitution cyphers where a plaintext letter maps to a different cyphertext letter such as Enigma changing with each key stroke

14
New cards

one-time pad

An unbreakable cypher where each message has it’s own key with the same or bigger length, meaning every possible key has an equal chance to be the correct one

15
New cards

perfect secrecy

when being able to see the cyphertext reveals nothing about the plaintext - as long as the key is only used once and is randomly generated

16
New cards

vernam cipher

A version of the one-time pad that uses a sequence of bits XOR’d with a random bit key to encrypt/decrypt text

17
New cards

10010110

The result of a Vernam Cipher encryption with the message 00101101 and the key 10111011

18
New cards

00101101

The result of a Vernam Cipher encryption with the message 10010110 and the key 10111011

19
New cards

stream cypher

encrypts bit(or byte)-by-bit: is faster but can be less secure if not implemented properly (e.g. if the key is reused)

20
New cards

block cypher

encrypts in fixed sized blocks: is slower and more complex but more secure

21
New cards

128 192 256

___, ___ and ___ bits are the key lengths used in the Advanced Encryption Standard

22
New cards

128

The size of the blocks used in the Advanced Encryption Standard