Ch 20 + 21 - Symmetric/Public Key Encryption & Message Confidentiality

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 21

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

22 Terms

1

Symmetric Encryption

A conventional form of public key encryption that uses the same key for both encryption and decryption.

New cards
2

Encryption Ingredients

  • encryption and decryption algorithms

  • input plaintext

  • output ciphertext

  • secret key.

New cards
3

Cryptography Classifications

Divided into:

  • types of operation (substitution, transposition)

  • number of keys (symmetric, asymmetric)

  • plaintext processing (block cipher, stream cipher).

New cards
4

Substitution Cipher

Mapping method in encryption that is prone to brute force attacks.

New cards
5

Transposition Cipher

An encryption method that rearranges the elements of the plaintext.

New cards
6

Block Cipher

Processes data one block of elements at a time.

New cards
7

Stream Cipher

Processes data elements continuously.

New cards
8

Secure Encryption Criteria

The cost and time to decrypt should exceed the value and relevance of the information.

New cards
9

Electronic Code Book (ECB)

A method of encryption where blocks are encoded using the same key.

New cards
10

Cipher Block Chaining (CBC)

A method of encryption using XOR to encode blocks of plaintext + ciphertext

New cards
11

Cipher Feedback (CFB)

A method of encryption that encodes with ciphertext then uses XOR with plaintext to produce another ciphertext

New cards
12

Output Feedback (CFB)

A method of encryption that encodes with ciphertext then uses DES with plaintext to produce another ciphertext

New cards
13

Counter (CTR)

A method of encryption that encodes via XOR and a counter that increments every block

New cards
14

Match the block ciphers with their application:

  • Cipher Feedback (CFB)

  • Output Feedback (CFB)

  • Electronic Code Book (ECB)

  • Cipher Block Chaining (CBC)

  • Counter (CTR)

  • Used for encrypting single values

  • Used for noisy channels

  • Useful for high speed requirements

  • Used for General Purpose/Authentication

  • Cipher Feedback (CFB) - Used for General Purpose/Authentication

  • Cipher Block Chaining (CBC) - Used for General Purpose/Authentication

  • Electronic Code Book (ECB) - Used for encrypting single values

  • Output Feedback (CFB) - Used for noisy channels

  • Counter (CTR) - Useful for high speed requirements

New cards
15

The biggest challenge in symmetric key encryption is _____

Key Distribution

New cards
16

Hash Function

Transforms data without using a key, creating a hash that summarizes the data. If the data is tampered with, a different hash is creeated

New cards
17

Secure Hash Algorithm (SHA)

A method that creates high bit hash values aimed at strengthening encryption.

New cards
18

HMAC

A combination of an encryption algorithm key and SHA hashing for added authentication while maintaining easy keys

New cards
19

RSA

The foundation of public key encryption, vulnerable to various attacks such as brute force and mathematical attacks.

New cards
20

Timing Attack

An unexpected attack that derives a private key from the time taken to decrypt information.

New cards
21

Diffie-Hellman Key Exchange

The first public key algorithm for secure secret key exchange, which is subject to man-in-the-middle attacks.

New cards
22

Blinding

A countermeasure against timing attacks that involves multiplying ciphertext before exponentiation.

New cards

Explore top notes

note Note
studied byStudied by 14 people
1005 days ago
4.0(1)
note Note
studied byStudied by 162 people
624 days ago
5.0(1)
note Note
studied byStudied by 16 people
122 days ago
5.0(1)
note Note
studied byStudied by 22 people
743 days ago
5.0(1)
note Note
studied byStudied by 61 people
882 days ago
4.0(1)
note Note
studied byStudied by 8 people
176 days ago
5.0(1)
note Note
studied byStudied by 10 people
898 days ago
5.0(1)
note Note
studied byStudied by 255 people
686 days ago
4.8(9)

Explore top flashcards

flashcards Flashcard (127)
studied byStudied by 31 people
911 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 19 people
266 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 8 people
784 days ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 29 people
737 days ago
5.0(2)
flashcards Flashcard (67)
studied byStudied by 9 people
837 days ago
5.0(1)
flashcards Flashcard (315)
studied byStudied by 51 people
763 days ago
5.0(4)
flashcards Flashcard (29)
studied byStudied by 15 people
379 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 84 people
17 days ago
5.0(1)
robot