Computer Security Lecture 4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

What is cryptography?

It originally meant “hidden writing” (from Greek). Today it is the science of making message contents inaccessible to outsiders.

2
New cards

Main goals of cryptography

Confidentiality, Integrity, Authentication.

3
New cards

Kerckhoffs’ Principle

A system must remain secure even if everything except the secret key is public; no security through obscurity.

4
New cards

Prime number

An integer p > 1 whose only divisors are 1 and p.

5
New cards

Composite number

An integer n > 1 that is not prime.

6
New cards

gcd(a,b)

The greatest integer dividing both a and b.

7
New cards

lcm(a,b)

The smallest positive integer divisible by both a and b.

8
New cards

Bézout’s Identity

There exist integers u, v such that ua + vb = gcd(a, b).

9
New cards

Fundamental Theorem of Arithmetic

Every integer ≥2 has a unique prime factorization (up to order).

10
New cards

Trial division

Factor by dividing n by primes up to √n and recording exponents.

11
New cards

gcd via factorization

Use the minimum prime exponents of a and b.

12
New cards

lcm via factorization

Use the maximum prime exponents of a and b.

13
New cards

Definition of a ≡ b (mod m)

m divides (a − b); a and b are in the same equivalence class modulo m.

14
New cards

Remainders not unique

Numbers like 12, 3, 21, −6 are all ≡ 3 (mod 9).

15
New cards

Equivalent elements in mod arithmetic

You can replace numbers with any congruent representative; computations are unchanged.

16
New cards

Zm

The set {0,…,m−1} with addition and multiplication mod m.

17
New cards

When does a have an inverse mod m?

When gcd(a, m) = 1.

18
New cards

Caesar cipher

Encrypt: eₖ(x)=x+k mod 26; Decrypt: dₖ(y)=y−k mod 26.

19
New cards

Affine cipher

Encrypt: e(x)=ax+b mod 26 with gcd(a,26)=1; Decrypt: a⁻¹(y−b) mod 26.

20
New cards

Weakness of classical ciphers

Small keyspace and monoalphabetic substitution → easy to brute-force and frequency-analyze.

21
New cards

Group definition

A set with closure, associativity, identity, and inverses (commutativity if Abelian).

22
New cards

Z*n

The multiplicative group modulo n: all a with gcd(a,n)=1 under multiplication mod n.

23
New cards

Order of an element

The smallest k≥1 such that aᵏ = identity.

24
New cards

Cyclic group

A group generated by one element α with ord(α)=|G|.

25
New cards

Z*p is cyclic

For every prime p, the group of units mod p is cyclic.

26
New cards

Order divides group size

In any finite group, ord(a) divides |G|.