CSE 3400 - Introduction to Cryptography and Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

class notes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

45 Terms

1
New cards

Cryptography is the study of secure _____ in the presence of an __________.

communication, adversary

2
New cards

An adversary is an ______

attacker

3
New cards

Modern cryptography is treated as a ____ ____ rather than art

mathematical science

4
New cards

Modern cryptography focuses on __________ security rather than secrecy of the _____.

provable, algorithm

5
New cards

In modern cryptography, the ultimate goal is to produce a ______ _______ _______

proof of security

6
New cards

Because not everything can be proven secure, modern cryptography relies on __________

assumptions

7
New cards

Historical cryptography often relied on security through __________.

obscurity

8
New cards

security through obscurity means the ____ itself is kept secret

algorithm

9
New cards

If a historically secret algorithm is leaked, the entire system must be __________.

redesigned

10
New cards

Kerckhoffs’s Principle states that a cryptographic system should remain secure even if the attacker knows the entire __________.

algorithm

11
New cards

According to Kerckhoffs’s Principle, security should depend ONLY on the secrecy of the __________.

key

12
New cards

A cryptographic assumption is a problem believed to be ____ ____ to solve efficiently.

computationally hard

13
New cards

In the eavesdropper model, the adversary can __________ to the communication but cannot ____ it.

listen, modify

14
New cards

A symmetric encryption scheme consists of __________ algorithms.

3

15
New cards

The algorithms in a symmetric encryption scheme are ___ ___, ___, and ___

key generation, encryption, decryption

16
New cards

Symmetric Encryption Scheme:

The encryption algorithm takes a ___ ___ “k” and a ____ “m” and outputs a ___

The decryption algorithm takes a ___ ___ “k” and a ____ “c” and outputs the original ___

The only piece of information unknown to the adversary is the ___ ___

secret key, message, ciphertext, secret key, ciphertext, message, secret key

17
New cards

Correctness requires that decrypting an encrypted message returns the ___ message

original

18
New cards

The shift cipher is an example of __________ encryption.

The key space of the shift cipher consists of the numbers ___ ___ ___

The shift cipher is insecure because its___ ___ is too __

symmetric, 0 through 25, key space, small

19
New cards

The sufficient key space principle states that the key space must be large enough to prevent __________ attacks.

brute force

20
New cards

The security parameter measures how __________ a system is to break.

hard

21
New cards

Increasing the security parameter usually increases both ___ and ___ ___

security, computational cost

22
New cards

A substitution cipher replaces each letter with a unique ___

The key space contains __ possible keys

It’s still insecure due to __ in the language

letter, 26!, patterns

23
New cards

In symmetric encryption, Alice and Bob share the same ___ ___

secret key

24
New cards

In symmetric encryption the SAME key is used for ____ and _____

encryption, decryption

25
New cards

The Vingenere cipher is a type of ____ cipher

polysubstitution

26
New cards

A polysubstitution cipher replaces ___ ____ ____ instead of individual letters

blocks of letters

27
New cards

In a block cipher, the key defines a ___ of blocks

permutation

28
New cards

Vingenere Cipher: the advesary knows the ___ ___ but not the actual ___

block size, permutation

29
New cards

Vingenere Cipher: increasing the block size helps ____ ____ in the plaintext

break patterns

30
New cards

Vingenere Cipher: the LARGER the block size, the ___ the key must be

larger

31
New cards

Vingenere Cipher: a major drawback of LARGE BLOCK SIZES is increased ____ ____ and ___ cost

key size, decryption

32
New cards

In general, the larger the key, the more ___ the ___

secure, encryption

33
New cards

classical ciphers are completely ____ by modern standards except when the key is as ___ as the message

insecure, long

34
New cards

The One-Time Pad is a historical cipher that is ____ ____ by modern definitions

perfectly secure

35
New cards

In one-time pad (otp):

the message is an ___ bit string

the KEY must be the ___ length as the message

decryption is performed using the same ____ operation as encryption

n, same, XOR

36
New cards

The XOR of a bit with 0 always equals the ____ _____.

original bit

37
New cards

The XOR of a bit with itself always equals _____.

0

38
New cards

Correctness means that
Dec(K, Enc(K, m)) = _____.

m

39
New cards

A One-Time Pad preserves _____ structure in the ciphertext.

no

40
New cards

Given a ciphertext, every possible plaintext is _____ likely under OTP.

equally

41
New cards

OTP cannot be broken by _____ ___ search.

brute force

42
New cards

OTP is impractical because it requires a _____ key for every message.

unique

43
New cards

Security means the adversary learns no ___ ___ from the ___

new information, ciphertext

44
New cards

In the privacy experiment, the oracle first generates a ___ ___

The ____ chooses two messages of _____ length.

The oracle picks a random bit from the set _____.

The adversary wins if it correctly guesses which _____ was encrypted.

An encryption scheme is secure if the adversary’s probability of winning is at most _____.

A probability higher than 50% means the scheme _____ information.

secret key, adversary, equal, {0,1}, message, 50%, leaks

45
New cards

message length cannot be hidden in the ___ model

eavesdropping