14 Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

What is the CIA triad?

  • Confidentiality - no unauthorised access to data

  • Integrity - no unauthorised change of data

  • Availability - service is always available to authorised users

2
New cards

What is symmetric key encryption?

Symmetric key encryption or private key cryptography is when sender and receiver share same private key used to encrypt and decrypt messages.

3
New cards

How is the cryptographic system characterised?

  • Type of encryption operations - substitution, transposition, product

  • Number of keys - single or multiple key

  • How plaintext is processed - block or stream

4
New cards

What is substitution cipher?

Sequence of bits or letters in plaintext replaced by other bits or letters. One example is Caesar cipher (replace each letter by third one after)

<p>Sequence of bits or letters in plaintext replaced by other bits or letters. One example is Caesar cipher (replace each letter by third one after)</p><p></p>
5
New cards

What is transposition cipher?

Transposition/Permutation cipher rearranges bits in ciphertext wihout changing letters used

<p>Transposition/Permutation cipher rearranges bits in ciphertext wihout changing letters used</p>
6
New cards

What are the key ideas of modern block ciphers?

  • Confusion - make relationship between ciphertext and key complex

  • Diffusion - make statistical relationship between plaintext and ciphertext complex

7
New cards

What is the feistel Cipher Structure?

  • Divide input into 2 halves

  • Perform substitution on left half of data

  • Perform permutation to swap 2 halves

<ul><li><p>Divide input into 2 halves</p></li><li><p>Perform substitution on left half of data</p></li><li><p>Perform permutation to swap 2 halves </p></li></ul><p></p>
8
New cards

What are some examples of product cipher?

Product cipher uses both substitution and transposition.

  • Data Encryption Standards (DES) in 1970 by IBM, uses 64 bits in block and key size

  • Advanced Encryption Standards (AES) in 1998, uses 128 bits in block and 128, 256 bits in key size

9
New cards

What are some examples of stream ciphers?

  • One time pad