Cryptography Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing key vocabulary from the Cryptography lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Cryptography

Secure transmission, storage, and usage of data in insecure environments by encryption.

2
New cards

Cryptanalysis

Analysis of cryptosystems and attacks against them with the aim to evaluate and strengthen them.

3
New cards

Cryptology

Cryptography + Cryptanalysis.

4
New cards

Cracking

Unauthorized access to computer systems.

5
New cards

Cipher

An algorithm for performing encryption/decryption.

6
New cards

Ciphertext

Encrypted version of a plaintext message.

7
New cards

Set

An unordered collection of elements without repetition.

8
New cards

Cardinality

The number of elements in the set.

9
New cards

Divisor

A number m is a divisor of n if n = km for some integer k.

10
New cards

Zm

The set of integers modulo m.

11
New cards

Function

A mapping between two sets where f(x) = y; A is the domain, B is the codomain.

12
New cards

Injection

A function where no two different inputs have the same output.

13
New cards

Binary Operation

A function ↖ : A → A ⇐ A, where a ↖ b = c.

14
New cards

Monoid

A set G with a binary operation ↖ : G → G ⇐ G that satisfies closure, associativity, and has a neutral element.

15
New cards

Group

A monoid (G, ↖) which fulfills the axiom, that for each a ⇒ G, there exists an inverse a↑1 ⇒ G such that a ↖ a↑1 = e.

16
New cards

Z*m

The largest subset of Zm that forms a group under multiplication · (mod m).

17
New cards

Greatest Common Divisor (GCD)

For two integers n, m, the largest positive integer that divides both n and m.

18
New cards

Symmetric Cryptosystems

Given the encryption/decryption key is private, the actual encryption and decryption functions E, D can still be public.

19
New cards

Public vs Private Information

The goal that the plaintext should be kept private, where the released ciphertext is public.

20
New cards

Kerckhoff's Principle

In particular, always assume that the adversary knows the cryptosystem used. Only the key is secret.

21
New cards

Ciphertext-only Attack

The adversary intercepts ciphertexts and tries to gain information on the plaintexts or keys.

22
New cards

Brute-force Attack

The adversary attempts decryption with every possible key until they succeed.

23
New cards

Known-plaintext Attack

The adversary knows a few plaintext-ciphertext pairs.

24
New cards

Chosen-plaintext Attack

The adversary can choose plaintexts and obtain the ciphertexts without having access to the key.

25
New cards

Chosen-ciphertext Attack

The adversary is able to decrypt some ciphertexts without having access to the key.

26
New cards

Chosen-text Attack

Plaintexts and ciphertexts can be chosen and encrypted/decrypted freely.

27
New cards

Endomorph Cryptosystem

A cryptosystem S = (M, C, K, D, E) with M = C is called endomorph.

28
New cards

Idempotent Cryptosystem

An endomorph cryptosystem S is idempotent if S applied twice is just another instance of S (with a different key).

29
New cards

Order of Finite Groups

Let G be a finite group. The order of G, |G|, is defined as the number of elements in G.

30
New cards

Order of Individual Elements in a Group

min{k ↔ 1 | ak = 1}.

31
New cards

Generator of G

An element g → G of order ordG(g) = |G|.

32
New cards

Cyclic

If G has a generator.

33
New cards

Discrete Logarithm

The unique exponent k → {0, 1,…, |G| ⇐ 1} with gk = a.

34
New cards

Polynomial Rings

R[x] is the ring of polynomials over x with coefficients in ring R.

35
New cards

Quotient Rings

Finite rings of polynomials called R[x]/p(x) where p(x) ↑ R[x] is called an ideal.

36
New cards

Prime

For any ring elements a, b if p divides a · b then p must divide either a or b.

37
New cards

Irreducible Element

Any non-zero, non-unit which is not a product of any two non-units.

38
New cards

Integral Domains

Rings that have the property that if a · b = 0 then either a or b must be zero.

39
New cards

Greatest Common Divisors

If m, n ↑ N are integers, the largest a ↑ N such that a | m and a | n.

40
New cards

Euclidean Domain

A GCD domain that is able to implement a terminating Euclid’s algorithm.

41
New cards

Knowledge of a key pair (e, n),(d, n) with ed ≡ 1 is enough to factor n

Is enough to factor n.

42
New cards

Breaking RSA

The task of knowing e, n, y to compute x where xe ≡ y (mod n).

43
New cards

Malleability

Replacing ciphertext y with ciphertext sey leads to the modified plaintext (sey)d ≡ (sexe)d ≡ sx mod n, so the attacker can apply a deterministic change.

44
New cards

Product Ciphers

Let S1 = (M1, C1, E1, D1, K1) and S2 = (M2, C2, E2, D2, K2) be two cryptosystems with C1 = M2. Then we define the product cryptosystem of S1 and S2 as S1 → S2 = (M1, C2, E, D, K1 → K2) with E(k1, k2; x) = E2(k2, E1(k1, x)), D(k1, k2; y) = D1(k1, D2(k2, y)) for all x ↑ M1, y ↑ C2 and (k1, k2) ↑ K1 → K2.

45
New cards

Abelian Groups

A group (G, ↔) is commutative or Abelian if for all a, b ↑ G we have a ↔ b = b ↔ a.

46
New cards

Rings

A set R with two binary operations +, · defined on it.

47
New cards

Unit

Any element that has a multiplicative inverse.

48
New cards

Feistel Ciphers

Feistel ciphers are a class of cryptographic schemes that differ in their “round function”.

49
New cards

Fields

A ring (F; +, ·), which fulfils the axioms, that (R, +) is an Abelian group with neutral element 0 and (R \ {0}, ·) is an Abelian group with neutral element 1.

50
New cards

Finite Fields

This field can be extended to a field of size pn for each number n → 1.

51
New cards

Local Substitution (SubBytes)

Non-linear computation of inverses in F(28).

52
New cards

Global Substitutions (Mix Columns)

Linear matrix multiplication

53
New cards

Global Permutations (Shift Rows)

Repeated Execution.

54
New cards

Order of the Multiplicative Group Z

We denote Z*m = {a ∈ Zm | gcd(a, m) = 1}.

55
New cards

Collision

Collision pair for h.

56
New cards

Compute a Pre-Image

Is hard for h, then h is called a one-way hash function.

57
New cards

Week Collision Resistant

Compute a second preimage.

58
New cards

Strong Collision Resistant

Compute a collision.

59
New cards

Birthday Attack

There is a collision pair for h with probability.

60
New cards

Signing the method directly

RSA digital signature: signature: (x, y), verifying: Does x = ye mod n hold?

61
New cards

Perfect security

If for all plaintexts x ∈ M and all ciphertexts y

62
New cards

A unitary matrix U ∈ Cn×n matrix s.t. U†U = UU† = I

Unitary transformation.

63
New cards

Wave-particle duality

Sub-atomic particles behave both as particles and as waves and are modelled using wave functions.

64
New cards

Quantisation

Quantum systems can only assume discrete, quantized values of energy, momentum etc.

65
New cards

Superposition

A quantum system can be in multiple different states simultaneously, called a superposition state.

66
New cards

Entanglement

Quantum particles can become entangled and a change in one state can effect an instant change in the other.

67
New cards

Uncertainty

The precise measurement of both the position and velocity of a quantum particle is impossible.

68
New cards

Factorisation as Period Finding Problem

Find a period r > 0 of the function f(x) = ax mod n, i.e. find r > 0 such that ar ≡ 1 mod n.

69
New cards

Quantum Fourier Transform

A quantum register of q qbits, represented using Q = 2q basis vectors |j〉 as |x〉 = ΣQ−1j=0 xj |j〉, we define the quantum Fourier transform x ↝ y as y = QFT|x〉, where:yk =1/√Q ΣQ−1j=0 xj εjq k , k = 0, 1,…, Q − 1, xj, yk ∈ Cwhere εq = e2πi/Q.

70
New cards

Known-Plaintext Attack

If in addition to the ciphertext the adversary also knows a few plaintext ciphertext pairs.

71
New cards

Chosen-Plaintext Attack

If the adversary gets even more power: He can choose plaintexts and obtain the ciphertext without having access to the key.

72
New cards

Chosen-Ciphertext Attack

If the adversary is able to decrypt some ciphertexts without having access to the key.