Home
Explore
Exams
Search for anything
Login
Get started
Home
Lecture 4 - Cryptography I
Lecture 4 - Cryptography I
0.0
(0)
Rate it
Studied by 0 people
0.0
(0)
Rate it
Call Kai
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Knowt Play
Card Sorting
1/57
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
58 Terms
View all (58)
Star these 58
1
New cards
Cryptography definition
Originally meant "hidden writing" (from Greek kryptos + graphein); now refers to encryption that makes message contents inaccessible to outsiders.
2
New cards
Plaintext M
Unencrypted message; the original readable content.
3
New cards
Ciphertext C
Output of encryption; unreadable without the key.
4
New cards
Key k
Critical secret parameter used for encryption/decryption; security depends on secrecy of k.
5
New cards
Cryptography goals
Confidentiality (hide message), Integrity (message unchanged), Authentication (verify sender).
6
New cards
Kerckhoffs' Principle
Cryptosystem must remain secure even if everything except the secret key is public; forbids security-through-obscurity.
7
New cards
Classic vs Modern ciphers
Classic = character-level (transposition/substitution). Modern = bits/integers; symmetric & asymmetric crypto.
8
New cards
Transposition cipher
Reorders characters without changing characters themselves (e.g., Skytale).
9
New cards
Substitution cipher
Replaces characters with other characters according to a rule (e.g., Caesar/affine).
10
New cards
Symmetric cryptography
Uses the *same key* for encryption and decryption.
11
New cards
Asymmetric cryptography
Uses *different keys* (public/private) for encryption and decryption.
12
New cards
Skytale cipher
Military cipher: plaintext = strip wrapped on staff; ciphertext = unwrapped strip; key = staff diameter.
13
New cards
Prime definition
Integer p > 1 whose only divisors are 1 and p.
14
New cards
Composite definition
Integer n > 1 that is not prime.
15
New cards
Greatest Common Divisor
gcd(a, b) = largest integer dividing both a and b.
16
New cards
Least Common Multiple
lcm(a, b) = smallest positive integer divisible by both a and b.
17
New cards
Bézout’s Identity
There exist integers u, v such that ua + vb = gcd(a, b).
18
New cards
FTA (Fundamental Theorem of Arithmetic)
Every integer ≥ 2 factors uniquely into primes (up to ordering).
19
New cards
Factoring method (trial division)
Divide by primes ≤ sqrt(n); record exponents; if remainder > 1, it's prime.
20
New cards
Example factorization: 360
360 = 2^3 * 3^2 * 5.
21
New cards
Example factorization: 1001
1001 = 7 * 11 * 13.
22
New cards
Example factorization: 2310
2310 = 2 * 3 * 5 * 7 * 11.
23
New cards
Example factorization: 8192
8192 = 2^13.
24
New cards
Example factorization: 999
999 = 3^3 * 37.
25
New cards
Example factorization: 5040
5040 = 2^4 * 3^2 * 5 * 7.
26
New cards
Naive GCD method
Factor both numbers; take minimum exponent of each prime; multiply.
27
New cards
GCD/LCM example (360, 168)
gcd = 24; lcm = 2520 (verified by 360*168 = gcd * lcm).
28
New cards
Number-theory functions
n = prime factorization p_i^e_i; τ(n)=Π(e_i+1); φ(n)=Π p_i^(e_i−1)(p_i−1).
29
New cards
Trial division limitations
Fast only for small factors; large primes require modern factoring algorithms (e.g., Pollard rho).
30
New cards
Modular arithmetic definition
Arithmetic performed over finite set {0,…,m−1}; a ≡ r mod m means m divides (a−r).
31
New cards
Remainder non-uniqueness
12 ≡ 3 ≡ 21 ≡ −6 (mod 9); many integers map to same equivalence class.
32
New cards
Equivalent class concept
All integers sharing same remainder mod m form a class; for m = 9, classes 0–8.
33
New cards
Modular exponent example
3^8 mod 7 = 2 (can simplify via partial reductions).
34
New cards
Integer ring Zm
Set {0,…,m−1} with addition and multiplication mod m.
35
New cards
Ring properties
Closed, associative, identity elements, additive inverses, distributive law; multiplicative inverses exist only for some elements.
36
New cards
Multiplicative inverse condition
a has inverse mod m iff gcd(a,m)=1.
37
New cards
Finding inverse example
In Z26, 15 has inverse (gcd=1) but 14 does not (gcd=2).
38
New cards
Shift cipher definition
Caesar cipher; encrypt with e_k(x)=x+k mod 26; decrypt with d_k(y)=y−k mod 26.
39
New cards
Shift cipher example
HELLO → QNUUX for k = 9-shifted alphabet; ATTACK → key 17 → RKKRTB.
40
New cards
Affine cipher definition
Encrypt e(x)=ax+b mod 26; decrypt d(y)=a^(-1)(y−b) mod 26; requires gcd(a,26)=1.
41
New cards
Invertible a values mod 26
In Z26, valid a values = {1,3,5,7,9,11,15,17,19,21,23,25}.
42
New cards
Finding inverse example (a=3)
3 * 9 ≡ 27 ≡ 1 mod 26 → 3^(-1)=9.
43
New cards
Affine cipher example
k=(a,b)=(9,13); ATTACK → NCCNFZ.
44
New cards
Shift/affine insecurity
Small keyspace, monoalphabetic mapping; vulnerable to brute force & frequency analysis.
45
New cards
Group definition
Set G with operation ∘ satisfying closure, associativity, identity, and inverse.
46
New cards
Abelian group
A group where a∘b = b∘a.
47
New cards
Group examples
(Z,+) is abelian; nonzero integers under multiplication are not a group; complex numbers under multiplication form abelian group.
48
New cards
Multiplicative group Z*_n
Elements of Z_n relatively prime to n under multiplication mod n; forms finite abelian group.
49
New cards
Example Z*_9
Z*_9 = {1,2,4,5,7,8}.
50
New cards
Finite groups
Finite cardinality |G|; e.g., |Z_n| = n, |Z*_n| = φ(n).
51
New cards
Element order definition
Smallest k ≥ 1 such that a^k ≡ 1 mod m.
52
New cards
Element order example
In Z*_11, ord(3)=5.
53
New cards
Cyclic group definition
Has generator α such that ord(α)=|G|; every element is α^i.
54
New cards
Theorem (Z*_p is cyclic)
Multiplicative group mod prime p is cyclic.
55
New cards
Two theorems for finite groups
If G finite and a∈G: (1) a^(|G|)=1. (2) ord(a) divides |G|.
56
New cards
Crypto-relevant algebra
Many cryptosystems rely on Zm, Z*_p, groups, orders, and properties of invertibility.
57
New cards
Cryptography takeaways
Cryptography requires confidentiality, integrity, authentication; Kerckhoffs Principle; number theory underlies modern crypto.
58
New cards