ISMN 5730 - Cryptography Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Cryptography

- The art and science of writing secrets

- Storing and transmitting information in a form that allows it to be revealed only to those intended

- Accomplished by a cryptosystem

2
New cards

types of cryptography

privacy, integrity, authenticity, non-repudiation

3
New cards

privacy

only intended recipient can read the message

contents of a message that you only want one person to read

4
New cards

integrity

the message cant be changed or altered in any way

integrity of the message that we are trying to maintain

the integrity of the message is what we are trying to maintain (contents)

5
New cards

authentication

we know who we are communicating with (how do we know?)

how can we prove who we claim to be

- Who were sending to or whos sending to us

6
New cards

non-repudiation

once you send a message to someone, you cant say you didn't send it later on

- Trail of evidence that proves that it was you

7
New cards

purpose of cryptography

- Protect sensitive information from disclosure

- Identify the corruption or unauthorized change information

- Make compromise too expensive or too time consuming

8
New cards

Cryptanalysis

- Practice of defeating attempts to hide information

- Reduction or solution of secret messages without knowledge of the system or the key or the possession of a code book

9
New cards

cryptanalysis is the study of what

the study and practice of finding weaknesses in ciphers

10
New cards

plaintext/clear text

wod document, email, and basic writing

11
New cards

Ciphertext/Cryptogram

scrambled/encrypted data (encrypted data)

12
New cards

encrypt

the act of putting information into a secret code to be deciphered later

13
New cards

decrypt

descramble with key

14
New cards

Cryptology

- includes both cryptography and cryptanalysis

- Encrypting and decrypting messages

15
New cards

algorithms

many different types of algorithms

more business use case than casual

16
New cards

Stream Ciphers

a method of encryption that encrypts a single bit of plaintext at a time, continuously. It is usually implemented in hardware. Ex: DirecTV satellite box uses this to decrypt a show's data and display it on your TV

17
New cards

Block Ciphers

a method of encryption that operates on fixed size of plain text (usually 64 bits). More suitably implemented in software to execute on general-purpose computers. Generally slower than stream ciphers

18
New cards

substitution ciphers

shift alphabet (A-D, B-E)

scramble alphabet (substitute one letter for a random other letter)

19
New cards

transposition cipher

left to right by rows

Flip the rows to columns, etc.

We can also do it diagonally

Rearranging rows or columns

20
New cards

DES (Data Encryption Standard)

- the best-known block cipher created in 1976.

- Designed by IBM based on Lucifer, improved by National Security Agency

- Worldwide acceptance due to its strength

- used for VPN Products, e-mail products, web security, etc

21
New cards

what is the order of well known symmetric ciphers

DES [most well known, 64 bit] --> AES[most commonly used, 256 bit, block cipher] --> RC4 [stream cipher]

22
New cards

Public Key

- the idea of __________ _______ cryptography was introduced in 1976

- at the time, we did not have the computing capabilities to process this idea

23
New cards

Symmetric

__________ cryptography involves a single key that must be shared by both the sender and receiver.

- DES is the common example of this

- significant problem with this is getting the key to the recipient without it being disclosed to anyone else

24
New cards

symmetric key

the key you use to encrypt and decrypt the data are shared, same on both sides

25
New cards

symmetric key traits

It is very fast

can encrypt large numbers of data efficiently

difficult to break

Availability Many different algorithms that use symmetric processes

26
New cards

weaknesses if symmetric keys

key management, key has to be secured

Key distribution

Every key you share with someone has to be different and unique to the next person (who youre talking to)

•Limited security

-Symmetric keys only encrypt data and restrict its access.

-

Does not provide proof of origin or non-repudiation

27
New cards

scalability weakness in symmetric keys

more people= more keys

28
New cards

symmetric encryption provides what

confidentiality and intergrity

29
New cards

scalability symmetric key

everyone needs a key for every other person to communicate

10 people= 45 keys (N (N-1) / 2

-Since a unique symmetric key must be used between the sender and each recipient, number of keys grows exponentially with the number of users : N (N-1) / 2

30
New cards

do symmetric keys have proof of origin

no

31
New cards

Asymmetric

___________ cryptography involves 2 keys, 1 private and 1 public. They are related to each other mathematically. It is computationally infeasible to derive the provate key from knowledge of the public key

32
New cards

both asymmetric keys are different, but they have what

a relationship, one way function

33
New cards

asymmetric is east to compute in one direction, but what

impossible to go backwards

X+9=16

X+9=?

34
New cards

assymetric: email example

Send you an email, need to encrypt so use your public key

CANT ENCRYPT SOMETHING WITH PRIVATE KEY AND EXPECT IT TO BE CONFIDENTIAL, NEED TO USE PUBLIC KEY (sender)

THE RECIVERS PRIVATE KEY IS USED TO UNLOCK THE EMAIL FOR THE RECIEVER

Sender used the receivers public key, once the receiver opens it, their private key will allow it to open

35
New cards

confidentiality in asymmetric

only the people that should read it, can read it

36
New cards

confidentiality keys

Sender used the receivers public key, once the receiver opens it, their private key will allow it to open

37
New cards

proof of origin

-Prove the message was not changed

-Prove the source of the message

-Make sure the signature isn't fake

38
New cards

proof of origin/ authentication asymmetric

-Sign with the private key (sender)

-Verify with the public key (receiver has senders public key)

39
New cards

strengths of asymmetric key

Strengths

Can provide five security elements:

•Confidentiality/Privacy (Data cannot be decrypted without the appropriate private key)

•Access Control (The private key should be limited to one person)

•Authentication (Identity of sender is confirmed)

•Integrity (Data has not been tampered with)

•Non-repudiation (Sender cannot deny sending)

40
New cards

strengths of asymmetric continued

Strengths

•Provides efficient encryption and digital signature services

•Efficient symmetric key distribution

•Scalability

-Only two keys needed per user

•1,000 people need total of 2,000 keys (easier to manage than the 499,500 needed for symmetric)

41
New cards

asymmetric weaknesses

computationally intensive

slow (1000 or more times slower than symmetric)

Computer needs to do a lot of processing

Nano seconds, really doesnt matter to humans

42
New cards

Most important asymmetric algorithm

RSA

43
New cards

RSA asymmetric example

Paypal website: public key is listed on website (HTTPS)

Primary for web traffic and web communications

44
New cards

message integrity controls

accidental changes: Hash Function, Checksum and Parity.

intentional changes: digital signature, keyed hash HMAC, CBC-MAC

45
New cards

hash function is the thing that gives us what

digitial signatures

46
New cards

What does a hash function do?

allows the digital signature to verify the contents of a message

47
New cards

the hash function verifies what

integrity (doesnt give confidentiality or proof of origin)

48
New cards

digital signatures

authentication tool to verify a message origin and sender identity

49
New cards

what do digital signatures prove

non repudiation, authentication (not confidentiality, just verifying)

50
New cards

digital signatures resolve what

authentication issues

provides proof of origin

-Block of data attached to message (document, file, record, etc.).

•Binds message to individual whose signature can be verified.

-By receiver or third party.

-Difficult to forge.

51
New cards

most popular digital signature sceheme

SHA-1- secure hash algorithm

52
New cards

DES-EDE3

a mode of triple DES that does 3 DES operations (encrypt-decrypt-encrypt) with 3 different keys

53
New cards

DES-EEE2 (DES-EDE2)

a mode of triple DES that does 3 DES operations (encrypt-decrypt-encrypt) but uses the same key for the 1st and 3rd operation

54
New cards

RC4

- the most commonly implemented stream cipher

- variable key size

- highly efficient, much faster the block cipher

- stream ciphers can be difficult to implement correctly

55
New cards

Larger

the __________ the key size of an algorithm, the stronger it is

56
New cards

Confidentiality

In public key algorithms, the operation of encrypting the originator's message with the public key of the receiver, then the receiver decrypting the message with the private key of the receiver ensures ______________

57
New cards

Proof of Origin

in public key algorithms, the operation of encrypting the originator's message with the private key of the originator, then the receiver decrypting the message with the public key of the originator ensures _____________

58
New cards

RSA

a public key algorithm that meets all three asymmetric needs: 1) data encryption, 2) key distribution of symmetric keys, 3) digital signatures for non-repudiation.

- it is the primary public key application we use

- mathematical problem of factoring the product of large prime integers

59
New cards

SHA-256

the most commonly used hashing function

60
New cards

AES (advanced encryption standard)

symmetric crypto, keeps constantly running transposition and substitution