Cryptography and Basic Security Mechanisms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Flashcards covering basic terminology, cryptographic techniques (Vernam, Transposition, Substitution, Concealment), Shannon's rules, cryptanalysis, and the comparison between symmetric and asymmetric cryptosystems.

Last updated 7:27 AM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

What is the Oxford Dictionary (2006) definition of cryptography?

A secret manner of writing, either by arbitrary characters, by using letters or characters in other than their ordinary sense, or by other methods intelligible only to those possessing the key.

2
New cards

According to the transcript, what is the relationship between cryptology, cryptography, and cryptanalysis?

Cryptology=Cryptography+Cryptanalysis\text{Cryptology} = \text{Cryptography} + \text{Cryptanalysis}

3
New cards

What are the formal notation representations for encryption and decryption?

Encryption is represented as C=E(P)C = E(P) and decryption is represented as P=D(C)P = D(C), where EE is the encryption algorithm and DD is the decryption algorithm.

4
New cards

What is the requirement for a cryptosystem to ensure the original message can be recovered?

P=D(C)=D(E(P))P = D(C) = D(E(P))

5
New cards

What convention is used for cleartext and ciphertext characters?

Cleartext is written in uppercase and ciphertext is written in lowercase.

6
New cards

How is the Vernam Cipher implemented regarding binary transformations?

It uses Modulo 22 transformations using binary XOR; for example, if P=110101P = 110101 and K=101010K = 101010, then C=P+K=011111C = P + K = 011111.

7
New cards

Define transposition in the context of cryptographic techniques.

The method by which symbols in the plaintext are moved into different positions in the ciphertext, preserving the total number of 11's and 00's.

8
New cards

What is the substitution method in cryptography?

The method by which symbols in the plaintext are replaced with different symbols, often using a lookup table.

9
New cards

How does the Caesar Cipher function as a substitution method?

It uses a 33 place offset in the alphabet, where the ciphertext character is calculated as ci=E(pi)=pi+3c_i = E(p_i) = p_i + 3.

10
New cards

What is concealment encryption?

A method where message symbols are mixed with many other symbols that carry no useful information.

11
New cards

According to Shannon's criteria (1949), why should the size of the ciphertext be restricted?

The size of the ciphertext should not be greater than the plaintext because more text provides more data for cryptanalysts and requires more storage and transmission time.

12
New cards

What are the specific goals of a cryptanalyst?

To break a single message, recognize patterns, infer meaning without breaking encryption, deduce the key, or find weaknesses in the algorithm or implementation.

13
New cards

What is the difference between symmetric and asymmetric cryptosystems regarding keys?

In a symmetric cryptosystem, KE=KDK_E = K_D (the same key is used), while in an asymmetric cryptosystem, KEKDK_E \neq K_D (different keys are used).

14
New cards

Define 'Confusion' as a characteristic of good encryption schemes.

Confusion means the interceptor cannot predict what will happen to the ciphertext when one character in the plaintext is changed; it hides the relationship between P+KP + K and CC.

15
New cards

Define 'Diffusion' as a characteristic of good encryption schemes.

Diffusion means that changes in the plaintext spread out over many parts of the ciphertext, requiring an attacker to access more of the ciphertext to infer the algorithm.

16
New cards

What are the common commercial encryption examples mentioned in the notes?

DES (Data Encryption Standard), RSA (Rivest-Shamir-Adelman), and AES (Advanced Encryption Standard).

17
New cards

In a symmetric encryption system with nn communicating users, how many separate keys are required?

n×(n1)2\frac{n \times (n - 1)}{2}

18
New cards

How does Public Key Encryption (PKE) handle key distribution?

The recipient keeps a private key (KDK_D) and distributes a corresponding public key (KEK_E) which does not require a secure channel and can be posted publicly.

19
New cards

What analogy is used for Asymmetric encryption in the lecture notes?

It is like using a safe with a locked deposit slot; a deposit slot key is needed to slide a document in (public key), but a safe door key is needed to retrieve it (private key).

20
New cards

Why is key management considered a major issue in cryptosystems?

Keys must be stored, safeguarded, and activated/deactivated (e.g., if they expire or a key is taken from a fired employee), and public keys must be correctly distributed.