Lecture 12 - Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Cryptography

the art of secret writing

converts data into unintelligible form

must be reversible

2
New cards

process of encryption and decryption

Plaintext

encryption (key)

ciphertext

decryption (key)

plaintext

<p>Plaintext</p><p>encryption (key)</p><p>ciphertext </p><p>decryption (key)</p><p>plaintext </p>
3
New cards

plaintext

a message in its original form

4
New cards

Ciphertext

a message in the transformed, unrecognized form

5
New cards

Encryption

the process that transforms a plaintext into a ciphertextd

6
New cards

decryption

the process that transforms a ciphertext to the corresponding plaintextkey

7
New cards

Key

the value used to control encryption/decryption

8
New cards

Caesar Cipher

moving each letter of plaintext n number of times to the right

to decrypt, you move it backwards (left)

9
New cards

symmetric

single key

the key used to encrypt a message is the same as the one used to decrypt it

10
New cards

Asymmetric

Public key

key to decrypt a message is different from the key used to encrypt it

11
New cards

Algorithm & key

single key encryption

two pieces of identical information encrypted with the same algorithm but with different keys produce completely different ciphertexts

do not need to keep algorithm secret, just the key

key is small (number of bits)

12
New cards

brute-force attacks

try all possible keys on some ciphertext until get an intelligible translation into plaintext

on average half of all possible keys must be tried to achieve success

13
New cards

Key management

with symmetric encryption, the communicating parties must share the one key

14
New cards

Data Encryption Standard (DES)

Single Key

developed in mid 1970s

used 56-bit key

broken by experts in less than a day

15
New cards

Triple DES (3DES)

3 different keys to produce the encrypted text

16
New cards

Advanced encryption standard (AES)

most advanced computers and techniques available today

will require 150 trillion years to break by brute force

life span: 20 years

17
New cards

RSA (Rivest-Shamir-Adleman)

most popular form of asymmetric encryption

two keys:

one key (public key) is used to encrypt message

second very different private key is used to decrypt the message.

from 512, 1024, 2048 bits in length

one way function: once it is encrypted by the one way function, the message cannot be decrypted without the private key

18
New cards

RSA Key Pair

  • Public key to encrypt the message

  • Private key to decrypt the message

19
New cards

RSA Key Length

RSA key sizes can be 512, 1024, or 2048 bits long. Larger key sizes provide stronger security.

20
New cards

RSA One-Way Function

RSA uses a one-way function—once encrypted, the message cannot be decrypted without the private key, ensuring secure communication.

21
New cards

Public key encryption benefits

reduce the key management problem

key management problem is reduced to the on-site protection of the private key