Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

When is the oldest date showing the use of cryptography?

Get a hint
Hint

1900 BC

Get a hint
Hint

What is the Caesar cipher?

Get a hint
Hint

transposition/shifting of the letters of the alphabet + substitution

Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

When is the oldest date showing the use of cryptography?

1900 BC

2
New cards

What is the Caesar cipher?

transposition/shifting of the letters of the alphabet + substitution

3
New cards

What is the main use of cryptography?

protecting the confidentiality of messages

4
New cards

What does steganography do?

hides the presence of a message

5
New cards

What is an example of a rotor machine?

Enigma machine

6
New cards

What is symmetric encryption?

The encryption and decryption happen using the same (secret) key on a piece of information x. This ensures its confidentiality.

7
New cards

What is asymmetric encryption?

Encryption where the encryption and decryption use two different keys.

8
New cards

What is an example of symmetric encryption?

Advanced Encryption Standard

9
New cards

How does asymmetric encryption work?

Each user has a pair of keys - one public and one private.

The sender encrypts the info x with the public key of the recipient.

The recipient decrypts with its private key

10
New cards

What are the main applications of asymmetric encryption?

symmetric key distribution and digital signatures

11
New cards

What are some examples of asymmetric encryption?

RSA, DSA

12
New cards

How does are public and private keys generated in RSA?

The sender creates two keys by:

Choosing two prime numbers p and q

Computing N where N = p x q

Computing T where T = (p-1) x (q-1)

Picking e and d such that (e x d ) mod T = 1

Public key = (N, e)

Private key = (N, d)

13
New cards

How is a message encrypted and decrypted in RSA?

To encrypt the message it is: (message)^e mod N where (N, e) is the public key of the recipient.

To decrypt the message it is (encryptedMessage)^d mod N where (N,d) is the private key of the recipient.

14
New cards

What formula do you use to calculate the number of keys needed for bidirectional communication with asymmetric encryption?

2 x number of nodes

15
New cards

What formula do you use to calculate the number of keys needed for bidirectional communication with symmetric encryption?

(n(n-1))/2

where n is the number of nodes

16
New cards

How is a message authenticated?

Using a digital signature that works by:

The sender encryption information x with their private key.

The recipient decrypting the message with the senders public key.

If they match the message is authenticated

17
New cards

What are example algorithms to use with digital signatures / authentications?

RSA, DSA

18
New cards

What is the need for digital signatures?

they guarantee the integrity of the sent message, source authentication, and non-repudiation

19
New cards

For symmetric encryption how can the secret keys be shared?

• Public-key cryptography

• Diffie-Hellman key exchange protocol

20
New cards

How does key distribution with public key encryption work?

  • Alice sends her public key (PUₐ) and identity to Bob.

  • Bob generates a secret key (Kₛ) for secure communication.

  • Bob encrypts Kₛ using Alice’s public key: Encrypt(Kₛ, PUₐ).

  • Alice receives the encrypted message and decrypts it with her private key to retrieve Kₛ.
    This allows both parties to share a symmetric secret key securely.

21
New cards

How can a man-in-the-middle (MITM) attack be carried out with public key encryption key distribution?

  • Charlie (the attacker) intercepts Alice’s public key and ID intended for Bob.

  • Charlie sends his own public key (PU꜀) and Alice’s ID to Bob, pretending to be Alice.

  • Bob encrypts the secret key Kₛ with PU꜀ (Charlie’s key), thinking it's Alice’s.

  • Charlie decrypts the message with his private key to obtain Kₛ.

  • Charlie then re-encrypts Kₛ with Alice’s actual public key and sends it to her.
    Now Alice, Bob, and Charlie all share the same secret key Kₛ — allowing Charlie to eavesdrop.

22
New cards

What is the purpose of the Diffie-Helmen key exchange protocol?

to enable two users to securely exchange a key that can then be used for subsequent symmetric encryption of messages

23
New cards

What does the effectiveness of the Diffie-helman key exchange protocol depend on?

the difficulty of computing discrete logarithms

24
New cards

How does the Diffie-Hellman key exchange work?

Here:

<p>Here:</p>
25
New cards

How can a man-in-the-middle attack occur in the Diffie-Hellman protocol?

An attacker intercepts the public keys and sends their own to both parties.

  • Alice thinks she’s talking to Bob but is talking to the attacker.

  • The attacker forms two separate shared keys with Alice and Bob, allowing them to read and modify messages.

26
New cards

How can man-in-the-middle attacks be prevented in Diffie-Hellman?

The solution is for the sender to put the signature • But to verify the signature you need the public key of the sender which is acquired using the Public Key Infastructure.