ITIS 3200: Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Symmetric Cryptography

Parties share a secret key used for both encryption and decryption. Plain text typically the same length as cyphertext.

2
New cards

Brute-Force Attack

Try all possible keys and determine if message is a likely plaintext

3
New cards

Substitution Cyphers

Each letter is uniquely replaced by another. An example is a Caesar Cypher. (ex. ROT13)

4
New cards

Block Cipher

Plaintext and Cipher Text have fixed length. Each message is divided into blocks and sometimes padding is added to keep the length fixed. (Examples: DES, 3DES, AES)

5
New cards

DES

Data Encryption Standard

64 bit, small key space makes exhausted search attack feasible since late 90s

6
New cards

Triple DES

Nested application of DES with 3 different keys: KA, KB, KC

Effective key length is 168 making exhausting search attacks unfeasible.

7
New cards

AES

Advanced Encryption Standard

128 bit blocks, exhaustive search attack no feasible. AES-128 is the algorithm choice of most commercial apps.

8
New cards

ECB

Electronic Code Book

The simplest block cipher mode.

Adv: Allows parallel encryptions, and can tolerate the loss/damage of block.

Disadv: Same plaintext -> Same Cipher. Docs and Images are not suitable since patters are repeated.

9
New cards

CBC

Cipher Block Chaining. The previous cipher text block is combined with the current block.

Adv: Doesn't show patterns, is the most common mode, fast and simple.

Disadv: Requires reliable transmission of all blocks sequentially. Not suitable for applications that allow packet loss (streaming)

10
New cards

Symmetric Key Distribution

Required each pair of 'n' communicating parties to share a (separate) secret key. n(n-1)/2

11
New cards

Diffie-Hellman Key Exchange

Used to generate/share keys between two parties if you do not trust the other party's ability to generate a secure key.

12
New cards

Public-Key Encryption

Person has a pair of keys.

1) A private key, kept secret, used to sign messages sent.

2) A public key, which is public, used by others to decrypt messages.

13
New cards

Digital Signature

Uses Public-Key cryptography. Bob signs a message with private key. Anyone can verify authenticity by decrypting with public key since Bob should be the only one with the private key.

14
New cards

Hash Functions

One way function that is collision-resistant (meaning hard to find two messages that are the same). Its pretty much shredding the message to a fixed length in cipher-text.

15
New cards

Certificate Authority

Digitally signs a binding between an identity and the public key for that identity.

16
New cards

Public Key Distribution

Only one pair of keys is needed for each user.

17
New cards

Fundamental Theorem of Arithmetic

The prime decomposition of a positive integer is unique.

18
New cards

Hash Table

Search data structure based on storing items in locations associated with their hash value. Chaining or open addressing deals with collisions

19
New cards

MD5

Message-Digest Algorithm 5

Uses 128-bit hash values. Widely used in legacy apps although considered insecure.

20
New cards

Compression Function

Works on input values of fixed length.

21
New cards

Iterated Hash Function

extends a compression function to inputs of arbitrary length.

22
New cards

MAC

Message Authentication Code

Hash function with two inputs (secret K and the message M). Gives message integrity. Receiver recomputes MAC tag from received message and compares it with received MAC tag. More efficient than signing each message.

23
New cards

BitCoin

Crypto currency. Most well known digital cash.