Week 1

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Symmetric Encryption

1 / 27

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

28 Terms

1

Symmetric Encryption

  • Definition: A type of encryption where the same key is used for both encryption and decryption.

  • Pros:

    • Faster than asymmetric encryption.

    • Suitable for encrypting large amounts of data.

  • Cons:

    • Key distribution can be challenging.

    • If the key is compromised, the security is broken.

New cards
2

Asymmetric Encryption

  • Definition: A type of encryption that uses a pair of keys – a public key for encryption and a private key for decryption.

  • Pros:

    • Solves the key distribution problem.

    • Provides digital signatures for authentication.

  • Cons:

    • Slower than symmetric encryption.

    • Requires more computational resources.

New cards
3

Confidentiality

Definition: Ensuring that information is accessible only to those authorized to have access.

New cards
4

Integrity

Definition: Ensuring that data is accurate and has not been tampered with.

New cards
5

Availability

Definition: Ensuring that authorized users have access to information and resources when needed

New cards
6

Breach of Security Levels of Impact

Definition: The severity of the consequences resulting from a security breach, ranging from low to high impact

New cards
7

Active Attacks

Definition: Attempts to alter system resources or affect their operation (e.g., modification of messages, replay attacks)

New cards
8

Passive Attacks

Definition: Attempts to learn or make use of information from the system but do not affect system resources (e.g., eavesdropping).

New cards
9

Nonrepudiation

Definition: Assurance that someone cannot deny the validity of their signature on a document or a message that they originated

New cards
10

Plaintext

Definition: The original message or data that is fed into the encryption algorithm

New cards
11

Ciphertext

Definition: The encrypted message produced as output by the encryption algorithm

New cards
12

Substitution

Definition: A cryptographic technique where elements of the plaintext are systematically replaced with other symbols

New cards
13

Transposition

Definition: A cryptographic technique where the positions of elements in the plaintext are shifted according to a regular system

New cards
14

Block Cipher

  • Description: Encrypts data in fixed-size blocks (e.g., 64 or 128 bits) using the same key for each block.

  • Pros:

    • Strong security due to complex encryption algorithms.

    • Suitable for encrypting large chunks of data.

  • Cons:

    • Can be slower due to processing entire blocks.

    • Padding may be required for data not fitting the block size.

New cards
15

Stream Cipher

  • Description: Encrypts data one bit or byte at a time using a key stream.

  • Pros:

    • Faster than block ciphers for streaming data.

    • No need for padding.

  • Cons:

    • More vulnerable to certain types of attacks if the key stream is not properly managed.

    • Typically weaker encryption than block ciphers.

New cards
16

Cryptanalysis

Definition: The study of analyzing information systems to understand hidden aspects of the systems

New cards
17

Brute Force

Definition: A method of breaking encryption by trying all possible keys until the correct one is found

New cards
18

Caesar Cipher

  • Description: A substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

  • Pros:

    • Simple and easy to understand.

  • Cons:

    • Very easy to break with frequency analysis or brute force

New cards
19

Monoalphabetic Cipher

  • Description: A substitution cipher where each letter of the plaintext is mapped to a fixed different letter of the alphabet.

  • Pros:

    • Slightly more secure than Caesar Cipher.

  • Cons:

    • Still vulnerable to frequency analysis

New cards
20

Permutation

  • Description: A transposition cipher that rearranges the positions of characters in the plaintext according to a certain system.

  • Pros:

    • Can be combined with substitution for increased security.

  • Cons:

    • Alone, it provides weak security

New cards
21

Playfair Cipher

  • Description: A digraph substitution cipher using a 5x5 matrix of letters to encrypt pairs of letters.

  • Pros:

    • More secure than simple substitution ciphers.

  • Cons:

    • More complex to use and understand.

    • Still vulnerable to frequency analysis

New cards
22

Hill Cipher

  • Description: A polygraphic substitution cipher that uses linear algebra and matrix multiplication to encrypt blocks of text.

  • Pros:

    • Stronger than monoalphabetic ciphers.

  • Cons:

    • Requires matrix inversion for decryption, which can be complex.

New cards
23

One-Time Pad

  • Description: A cipher where the plaintext is combined with a random key that is as long as the plaintext.

  • Pros:

    • Provably unbreakable if the key is truly random and used only once.

  • Cons:

    • Key distribution and management are impractical for most uses

New cards
24

Rail Fence Cipher

  • Description: A transposition cipher that arranges the plaintext in a zigzag pattern and then reads off each row.

  • Pros:

    • Simple to implement.

  • Cons:

    • Weak security, easy to break with a small number of rows.

New cards
25

Row Transposition Cipher

  • Description: A transposition cipher that arranges the plaintext in a rectangle and then permutes the columns according to a key.

  • Pros:

    • More secure than the Rail Fence Cipher.

  • Cons:

    • Still vulnerable to anagramming attacks if the key is short or simple.

New cards
26

Vigenere Cipher

Description

The Vigenère Cipher is a method of encrypting alphabetic text by using a simple form of polyalphabetic substitution. It employs a keyword to shift the letters of the plaintext. Each letter in the keyword shifts corresponding letters in the plaintext by different amounts, resulting in a more secure cipher than simple substitution.

Pros
  • Increased Security: More secure than monoalphabetic ciphers due to multiple Caesar ciphers being applied.

  • Simple to Implement: Easy to understand and implement by hand.

Cons
  • Vulnerable to Kasiski Examination and Frequency Analysis: Patterns in the keyword can be exploited to break the cipher.

  • Keyword Management: The security of the cipher heavily depends on the secrecy of the keyword

New cards
27

Vigenere Cipher Hand Encryption

  • Choose a Keyword: Repeat the keyword until it matches the length of the plaintext.

  • Convert Letters to Numbers: Assign a number to each letter (A=0, B=1, ..., Z=25).

  • Shift Letters: For each letter in the plaintext, shift it by the number corresponding to the keyword letter.

  • Convert Numbers Back to Letters: Convert the resulting numbers back to letters.

New cards
28

Vigenere Cipher Hand Decryption

  • Repeat the Keyword: As in encryption, match the length of the ciphertext with the repeated keyword.

  • Convert Letters to Numbers: Assign numbers to both the ciphertext and the keyword.

  • Reverse the Shift: Subtract the keyword number from the ciphertext number for each letter.

  • Convert Numbers Back to Letters: Convert the resulting numbers back to letters.

New cards

Explore top notes

note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 151 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 298 people
Updated ... ago
5.0 Stars(9)
note Note
studied byStudied by 347 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 6 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard50 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard57 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard204 terms
studied byStudied by 7 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard799 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 46 people
Updated ... ago
5.0 Stars(2)