Cryptography Quiz 1

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Confidentiality, Integrity, Availability

The three key objectives of information security.

2
New cards

Confidentiality

Assures that private information is not disclosed to unauthorized individuals.

3
New cards

Privacy

Assures individuals control on what personal information is collected and disclosed.

4
New cards

Integrity

Assures that data/programs are changed only in an authorized manner.

5
New cards

Authenticity

Assures that a system performs its intended function free from manipulation.

6
New cards

Availability

Assures systems work promptly and services are not denied to users.

7
New cards

Passive attacker

An attacker who only eavesdrops.

8
New cards

Active attacker

An attacker who can alter communication.

9
New cards

Message Authentication Code (MAC)

A value associated with a message to verify integrity, using a secret key.

10
New cards

Asymmetric algorithms

Encryption algorithms that use a key pair.

11
New cards

Key distribution

The process of securely distributing symmetric keys.

12
New cards

Substitution cipher

In this cipher, plaintext letters are replaced with other letters, numbers, or symbols.

13
New cards

ROT13

A Caesar cipher with a shift of 13.

14
New cards

Playfair cipher

This cipher uses digrams and a 5×5 keyword matrix.

15
New cards

One-time pad

The only cryptosystem proven unbreakable.

16
New cards

Substitution cipher vs Transposition cipher

Substitution replaces characters; transposition rearranges them.

17
New cards

Why is Caesar cipher unsecure?

It has only 25 possible shifts, easily brute-forced.

18
New cards

What makes One-time pad (OTP) secure?

The key is truly random, as long as the message, and used only once.

19
New cards

In Playfair cipher how are diagrams handled if both letters are the same?

A filler letter (like X) is inserted between the repeated letters.

20
New cards

Playfair cipher treatment of I and J

I and J are combined into one letter (treated as the same).

21
New cards

Monoalphabetic cipher

One fixed substitution

22
New cards

Polyalphabetic cipher

Multiple shifting substitutions.

23
New cards

Vigenère cipher

The cipher that introduced the concept of polyalphabetic substitution.

24
New cards

Symmetric cipher model components

Plaintext, ciphertext, key, encryption algorithm, decryption algorithm.

25
New cards

Cryptanalysis

Breaking ciphers using weaknesses

26
New cards

Block cipher

This cipher encrypts fixed-size blocks

27
New cards

Stream cipher

This cipher encrypts one bit/byte at a time.

28
New cards

DES algorithm block size

64 bits.

29
New cards

How many rounds does DES use?

16 rounds.

30
New cards

Weaknesses of DES

Small key size (56 bits), vulnerable to brute-force and differential/linear cryptanalysis.

31
New cards

AES key sizes

128, 192, and 256 bits.

32
New cards

AES vs DES

AES is stronger and faster; DES is weaker and obsolete.

33
New cards

Feistel structure

A structure that splits text into halves and processes in rounds; DES is based on it.

34
New cards

AES main operations

SubBytes, ShiftRows, MixColumns, AddRoundKey.

35
New cards

OpenSSL

A toolkit for encryption, certificates, and SSL/TLS operations.

36
New cards

Cryptool2

A teaching tool to visualize cryptographic algorithms and attacks.

37
New cards

PyCryptodome package

A Python library for modern cryptography implementations.

38
New cards

Key distribution challenge

Both parties need the same secret key but cannot share it securely over insecure channels.

39
New cards

Confusion in cipher design

Obscures the key-ciphertext relationship

40
New cards

Diffusion in cipher design

Spreads plaintext influence across ciphertext

41
New cards

Diffusion example

DES (through permutation operations).

42
New cards

Difficulty of breaking ciphers

Polyalphabetic is harder to break because frequency analysis is less effective.

43
New cards

If an attacker only observes ciphertext but knows the encryption algorithm, what kind of attack are they performing?

Ciphertext-only attack

Explore top flashcards