Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

20 Terms

1
New cards

What is Cryptography?

the art of writing/solving codes

  1. it defines what it means to be secure in a precise, mathematical way

  2. it involves designing systems to achieve these precise definitions

  3. and proving that they do so

2
New cards

How does a Crypto System Work?

  • the plaintext is processed by an encryption algorithm to produce the ciphertext

  • the receiver then uses a matching decryption algorithm to recover the plaintext from the ciphertext

  • there would be no security if these algorithms were known to everyone

    • hence, there is an additional piece of input data called a key

    • the key is secret, even though many people may know the algorithms

3
New cards

What are the Types of Crypto Systems?

  • Encryption Systems

  • Systems for Data Integrity

    • Message Authentication Codes (MACs)

    • Digital signatures

  • Hash Functions

4
New cards

What is a Cryptographic Key?

the length, measured in bits, determines security by defining the number of possible keys, with longer keys generally offering more security against brute-force attacks

5
New cards

What are the Types of Cryptography?

  • secret-key/symmetric

  • public-key/asymmetric

6
New cards

What are Security Services?

the specific security goals that we may want to achieve

  • confidentiality

  • data integrity

  • data origin authentication

  • non-repudiation - an entity can’t deny a previous action

7
New cards

What is Kerckhoff’s Principle?

a cryptographic system should be secure even if everything about the system, except for the key, is public knowledge

8
New cards

What is a Passive Attack?

the attacker doesn’t change any data/processes

unauthorised access to data

9
New cards

What is an Active Attack?

usually involve change to the data or to a process carried out on the data

10
New cards

What is Encryption?

process of transforming information in a way that, ideally, only authorised parties can decode

11
New cards

What is the Notation for an Encryption System?

knowt flashcard image
12
New cards

What is a Ciphertext-Only Attack?

passive attacker that knows only ciphertexts

13
New cards

What is a Known-Plaintext Attack?

active attacker that knows some plaintext and ciphertext pairs

14
New cards

What is a Chosen-Plaintext Attack?

active attacker that knows plaintexts and ciphertext pairs, where the plaintext is chosen by the attacker

modern encryption systems are usually designed to withstand (at least) this attack

15
New cards

What is a Chosen-Ciphertext Attack?

active attacker that knows plaintext and ciphertext pairs, where the plaintext and ciphertexts can be chosen by the attacker

16
New cards

What is the difference between a Chosen-Plaintext Attack and a Chosen-Ciphertext Attack?

CCA is stronger

  • has the ability to see how modified or constructed ciphertexts are decrypted

  • often reveals secret key info

17
New cards

What is a Digital Signature?

mathematical scheme for verifying the authenticity of digital messages or documents

18
New cards

What is a Cryptographic Hash Function?

must:

  • be a compression function:

    • h: (0,1)* → (0,1)n

  • be easy to compute

19
New cards

What Properties should a Cryptographic Hash Function provide?

  • preimage resistance - given a hash , it should be computationally difficult to find a message m such that h(m) = y

  • second preimage resistance - given a message m and hash h(m), it should be computationally difficult to find a message m' such that m m' and h(m) = h(m')

  • collision resistance - it should be difficult to find two messages m and m' such that m m’ and h(m) = h(m')

20
New cards

What is the difference between Second Pre-Image Resistance and Collision Resistance?

collision resistance is a stronger property because it allows finding any pair, whereas second preimage requires breaking a specific, given input