Ch 20 + 21 - Symmetric/Public Key Encryption & Message Confidentiality

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Symmetric Encryption

A conventional form of public key encryption that uses the same key for both encryption and decryption.

2
New cards

Encryption Ingredients

  • encryption and decryption algorithms

  • input plaintext

  • output ciphertext

  • secret key.

3
New cards

Cryptography Classifications

Divided into:

  • types of operation (substitution, transposition)

  • number of keys (symmetric, asymmetric)

  • plaintext processing (block cipher, stream cipher).

4
New cards

Substitution Cipher

Mapping method in encryption that is prone to brute force attacks.

5
New cards

Transposition Cipher

An encryption method that rearranges the elements of the plaintext.

6
New cards

Block Cipher

Processes data one block of elements at a time.

7
New cards

Stream Cipher

Processes data elements continuously.

8
New cards

Secure Encryption Criteria

The cost and time to decrypt should exceed the value and relevance of the information.

9
New cards

Electronic Code Book (ECB)

A method of encryption where blocks are encoded using the same key.

10
New cards

Cipher Block Chaining (CBC)

A method of encryption using XOR to encode blocks of plaintext + ciphertext

11
New cards

Cipher Feedback (CFB)

A method of encryption that encodes with ciphertext then uses XOR with plaintext to produce another ciphertext

12
New cards

Output Feedback (CFB)

A method of encryption that encodes with ciphertext then uses DES with plaintext to produce another ciphertext

13
New cards

Counter (CTR)

A method of encryption that encodes via XOR and a counter that increments every block

14
New cards

Match the block ciphers with their application:

  • Cipher Feedback (CFB)

  • Output Feedback (CFB)

  • Electronic Code Book (ECB)

  • Cipher Block Chaining (CBC)

  • Counter (CTR)

  • Used for encrypting single values

  • Used for noisy channels

  • Useful for high speed requirements

  • Used for General Purpose/Authentication

  • Cipher Feedback (CFB) - Used for General Purpose/Authentication

  • Cipher Block Chaining (CBC) - Used for General Purpose/Authentication

  • Electronic Code Book (ECB) - Used for encrypting single values

  • Output Feedback (CFB) - Used for noisy channels

  • Counter (CTR) - Useful for high speed requirements

15
New cards

The biggest challenge in symmetric key encryption is _____

Key Distribution

16
New cards

Hash Function

Transforms data without using a key, creating a hash that summarizes the data. If the data is tampered with, a different hash is creeated

17
New cards

Secure Hash Algorithm (SHA)

A method that creates high bit hash values aimed at strengthening encryption.

18
New cards

HMAC

A combination of an encryption algorithm key and SHA hashing for added authentication while maintaining easy keys

19
New cards

RSA

The foundation of public key encryption, vulnerable to various attacks such as brute force and mathematical attacks.

20
New cards

Timing Attack

An unexpected attack that derives a private key from the time taken to decrypt information.

21
New cards

Diffie-Hellman Key Exchange

The first public key algorithm for secure secret key exchange, which is subject to man-in-the-middle attacks.

22
New cards

Blinding

A countermeasure against timing attacks that involves multiplying ciphertext before exponentiation.