CSEC 701 Cryptography Review 2

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

main security principles

defense in depth and least privilege

2
New cards

symmetric key

same key for decryption and encryption

3
New cards

symmetric key problems

key distribution, massive key requirements, and unlimited compromising power once broken

4
New cards

asymmetric key

different keys for encryption and decryption

5
New cards

substitution

replacing an item with a different item

6
New cards

transposition

changing the order of items

7
New cards

substitution cipher

units of plaintext are substituted with cipher text according to regular system, decipher using inverse substitution

8
New cards

Caesar cipher

mono-alphabetic substitution, shift cipher, rotate letter positions by n amount, vulnerable to frequency analysis (1:n)

9
New cards

cipher wheel

plaintext outside, cipher text inside

10
New cards

Vigenere cipher

polyalphabetic cipher,

11
New cards

one-time pad

large, non repeating set of keys, section of keys is used once and then destroyed, receiver needs identical pad to decrypt, most secret stream cipher

12
New cards

perfect cipher

information secure, impossible to break, data + random = random

13
New cards

transposition cipher

rearranges symbols,

14
New cards

transposition weaknesses

frequency analysis, if frequency distribution follows plaintext, it is trnsp

15
New cards

substitution-permutation ciphers

the basis of modern block ciphers, 1949, combine s box and p box

16
New cards

block cipher

plaintext is divided into blocks of a preset size, stronger than stream-based ciphers

17
New cards

IBM lucifer cipher

64 bit block size, 1971

18
New cards

data encryption standard DES

encrypts 64 bit block using a 56 bit key, combo of substitution and transposition, feistel cipher

19
New cards

brute force attack

try every key, proportional to key size

20
New cards

short key problem

56 bit vulnerable to brute force attack, increase key size by repeating DES multiple times,

21
New cards

double DES

using two keys, encrypt twice

22
New cards

meet in the middle attack

  1. assume attacker knows two pair of c and p

  2. attacker computes for all possible keys and stores them in table

  3. attacker computes for other side and compares results with the table entries

    *time complexity

23
New cards

triple DES

to avoid MITM attack, run DES three times, tends to be slow and blobk size of 64bit too small

24
New cards

advanced encryption standard AES

block ciphers of 128 bits and key szes of 128, 192, and 256 bits

  • one permutation stage, three substitution stages

  • cannot reuse same key for all blocks

25
New cards

mode

technique for applying the cipher by mixing its outputs to hide ciphertext patterns

26
New cards

electronic code book ECB

each block is encrypted independently of the other, identical blocks of plaintext result in same cipher text, use for secure transmission of few blocks of data

27
New cards

cipher block chaining CBC

message blocks are linked together, uses initialization vector to start process, use for bulk data encryption

28
New cards

initialization vector

ensures each encryption yields different ciphertext, even when encrypting the exact same plaintext, stored in plaintext

29
New cards

block cipher into stream cipher

generates blocks of ciphertext that serve as a key stream

30
New cards

cipher feedback CFB

message is treated as stream of bits, standard allows any number of bit to be feed back, use for stream data encryption and authentication

  • s-bit, b-bit, IV size, during decryption, encryption is used

31
New cards

output feedback OFB

generate the keystream before the data is available to encrypt (or decrypt)

32
New cards

counter CTR

encrypts counter value rather than any feedback value, must have different counter value for every plaintext block, use for high-speed network encryption, NO chaining

33
New cards

CTR advantages

efficiency, random access, simplicity

34
New cards

stream cipher

psuedo one-time pad, encrypts one bytes at a time, very fast

Explore top flashcards