Intro To Security - Quiz 2 (Cryptography)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

Weeks 3 and 4

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Cryptology

The science behind cryptography

2
New cards

Cryptography

The process of making and using code to secure information

3
New cards

Cryptoanalysis

The process of decrypting a ciphertext

4
New cards

Plaintext

Original message

5
New cards

Ciphertext

Coded message

6
New cards

Cipher

Algorithm for transforming plaintext into ciphertext and vice versa

7
New cards

Key

Info used in cipher known only by sender and reciever

8
New cards

Enciphering/Encryption

Process of converting plaintext into ciphertext

9
New cards

Deciphering/Decryption

Process of converting ciphertext to plaintext

10
New cards

Obfuscate

Render obscure or unclear

11
New cards

Why do we use cryptograhpy

It improves information security

  • Keeps data safe

  • Helps with threats

12
New cards

Symmetric Cipher

A single key is used for both encryption and decryption

  • Security lies with the key

  • Requires sender and receiver to agree on a key

Negatives

  • Difficult to manage and update

  • Keys must be exchanged (may not be safe)

  • Keys can be compromised

13
New cards

Asymmetric Cipher

Different keys are used for encryption and decryption

14
New cards

Block cipher

  • Encrypts a block of plaintext at a time

  • Less overhead

  • High diffusion

  • Slow

15
New cards

Stream cipher

  • Encrypts data one bit or one byte at a time

  • Each bit uses a separate key

  • CPU intensive

  • Much faster than block cipher

  • Key is as long as plaintext

  • Low diffusion

16
New cards

Main requirements for cipher

  • Confusion

  • Diffusion

17
New cards

Confusion

Interceptor cannot predict what will happen to the ciphertext by changing one character in the plaintext

18
New cards

Diffusion

Information from single plaintext is distributed over the entire cipher

19
New cards

Substitution cipher

Replacing each element of the plaintext with another element

20
New cards

Transposition cipher

Rearranging the order of elements of the plaintext

21
New cards

Product Cipher

Using multiple stages of substitutions and transpositions

22
New cards

Caesar Cipher

  • Earliest known substitution cipher

  • Invented by Julius Caesar

  • Each letter is replaced by the letter three positions further down the alphabet

23
New cards

Monoalphabetic Substitution Cipher

Shuffle the letters, then choose random letter for each letter

24
New cards

Polyalphabetic Substitution Cipher

Each plaintext letter has multiple corresponding ciphertext letters

25
New cards

Vigenere Cipher

Advanced type of substitution cipher

  • Have a key word

    • Repeat key word until size of plaintext

  • Add plaintext letter and key word letter to get encrypted letter

26
New cards

Book-Based cipher

Uses a text from a predetermined book as a key to decrypt a message

27
New cards

Book Cipher

Ciphertext consists of a list of codes representing page, line, and work numbers of plaintext

28
New cards

Running key cipher

Uses a book for passing the key to cipher (similar to vigenere cipher)

29
New cards

Template Cipher

Involves use of hidden message in book, requires page with specific number of holes cut into it

30
New cards

Row Transposition Cipher

Type of diffusion cipher

  • Key is random arrangement of numbers

  • Write plaintext out in rows length of key, fill extra space with xyz

  • The order of numbers of the key corresponds to the order of columns you write in 

    • Key = 3421

    • Ciphertext = c3, c4, 2, c1

31
New cards

Kerkhoff’s principle

The adversary knows all details about a cryptosystem except the secret key

32
New cards

2 general approaches to cryptoanalysis

  • Brute force attack

  • non-brute force attack

33
New cards

Brute force attack

Try every key to decipher a ciphertext

34
New cards

Ciphertext-only attack

Use statistics and other information to decrypt intercepted ciphertext

35
New cards

Known-plaintext attack

If some of the plaintext is known, one could uncover some of the plaintext-ciphertext

36
New cards

Chosen-plaintext attack

Intruder can choose the plaintext message and receive the ciphertext form

37
New cards

Chosen-ciphertext attack

The intruder can choose the ciphertext message and receive the plaintext

38
New cards

Hash Functions in cryptograhpy

How has functions are used in cryptography

  • Takes input and produces a fixed size output called a has value

  • Doesn’t encrypt, doesn’t use a key and you cant reverse them

  • Preimage resistance

  • Collision resistance

  • Security strength is half the bit length of hash outputs

  • Example

    • User enters a p word

    • System stores hashed version

      • no need to know actual p word

      • just compares the hash

39
New cards

Preimage resistance

Hard to compute M given hash(M)

40
New cards

Collision resistance

No 2 inputs give the same hash output

41
New cards

SHA2

Hash function

  • Widely used

  • Government standard

42
New cards

Salting

The addition of a unique, random string of characters

43
New cards

Stenanography

Hiding the fact that a hidden message is being hidden

44
New cards

LSB Manipulation

Idea that the LSB of a byte can change with little change to the overall file

  • Used in images

  • Changing LSB of grey wont change the image that much

  • This way you can hide 115200 characters

Advantages

  • Does not change the size of the file

  • Is harder to detect than any other steganography techniques

Disadvantages

  • Normally must use the original program to hide and reveal data

  • If the picture with hidden information is converted to another format then the hidden data may be lost

45
New cards

Data Encryption Standard (DES)

Type of symmetric block cipher

  • 64 bit block size

  • Uses 56 bit key

  • 2 hours to find key on modern computers

46
New cards

Advanced Encryption Standard (AES)

Type of symmetric block cipher

  • 128 Bits = one block

  • 128, 192, 256 bit keys

  • Iterative rather than Feistel

47
New cards

Block Cipher Notation

P = plaintext block

C = ciphertext block

C = E(P, K) = Ek(P)

  • Encrypt P with K to get ciphertext

P = D(C, K) = Dk(P)

  • Decrypt C with key K to get plaintext P

48
New cards

DES security concerns

56-bit key is too short

  • Can be broken on average in 2^55

  • Moore’s law - computers are getting faster every year

49
New cards

2DES

DES + DES

  • 2 encryption stages

  • 2 keys

  • Supposed to be 2^112

50
New cards

2DES Meet-In-The-Middle Attack

2DES is only 2 × 2^56 which is only 2^57 not 2^112

  • You are doing 2^56 twice

51
New cards

RC4

Most popular stream cipher

  • 10x faster than DES

  • used in TLS and WEP

  • Initial bytes of key stream are weak

52
New cards

Asymmetric Cryptography (Public-Key Cryptography)

Addresses two key issues

  • Key distribution- secure communication without having to trust distribution center

  • Digital Signatures - Verify that message comes intact from claimed sender

Uses 2 different keys

  • Public key - shared with everyone (used to encrypt)

  • Private key - Secret (used to decrypt)

53
New cards

RSA (Rivest-Shamir-Adelman) Encryption

Security comes from the difficulty of factoring large prime numbers

How it works

  • Choose 2 large prime numbers, p and q

  • Compute there product, N

  • Compute (p-1) * (q-1), r

  • Select e, 1 < e < N (5 always works)

  • Compute d, d * e = 1 mod r

  • Public key = (n, e)

  • Private key = (n, d)

54
New cards

Main Attacks on RSA

  • Brute

  • Mathematical

  • Timing

  • Power consumption

  • Errors

55
New cards

Computationally Secure

  • The cost of breaking the cipher exceeds the value of information

  • The time required to break the cipher exceeds the lifetime of the information

56
New cards

Unconditionally Secure

If it secure no matter how much resources the attacker has