What is Cryptography - The science of encrypting, hiding, information
Cyphers - moving a letter around, jumbled in a different sequence
Cryptanalysis - process of analyzing available information in an attempt to return the encrypted message to its original form.
Differential cryptanalysis - comparing the input plaintext to output ciphertext to try and determine key used to encrypt the info.
Linear cryptanalysis - uses both plaintext and ciphertext, puts plaintext through simplified cipher to try and deduce the key.
Cryptographic is to - hiding data, resiting forgery, resisting unauthorized change, resisting repudiation, enforcing policy, and exchanging keys
cryptographic operations performed by - using both algorithm and a key
cryptographic operations use - encryption , hashing, digital signatures
To encrypt information it is based on two different operations - substitution and transposition
what is substitution - replacement of items with a different item
what is transposition - changing of the order form
keyspace - a set of possible key values.
diffusion - one change in plaintext means many changes in ciphertext
confusion - randomness of an output. each character of ciphertext depends on several parts of the key
obfuscation - the masking of an item to render it unreadable, still useable
Perfect forward secrecy - property of a public key system in which a key derived from another key is not compromised even if the originating key is compromised in the future
Security through obscurity - Naming after a progressive set of objects
Transposition cipher - same letters used but order is changed.
plaintext - unencrypted output
ciphertext - encrypted output
algorithm - step by step recursive computational procedure for solving a problem in finite number of solutions
Hashing - takes an input and mathematically reduces it to a unique number known as hash
(not reversible)
Symmetric algorithm - shared secret algorithm (same key used for encryption and decryption)
asymmetric algorithm - use a very different process by employing two keys, public and private key (key pair)
key - special piece of data used in encryption and decryption processes
eXclusive OR(XOR) - bitwise function applied to data., depends system on secrecy of the key
shift cipher - one letter of the alphabet is shifted a set of number of places in alphabet for another letter.
ROT 13 - every letter is rotated 13 positions
Vigenere cipher - works as polyalphabetic subsitution cipher, depends on password
Key management - exchange, storage, safeguarding, revocation of keys.
Which encryption uses key management? asymmetric encryption
Salting - provides sufficient entry for low entropy inputs to hash functions
hashing function - special mathematical function that performs a one way function
One way function - no feasible way to retrieve plaintext from ciphertext once algorithm is processed
hash - the output of the hashing algorithm for a specific output
MAC - Message authentication code
HMAC - Hash-based message authentication code, special subset of hashing technology
collision attack - vulnerability to hash algorithms, attacker finds two different messages that hash the same value
Message digest - creates a message digest/hash from data input into the algorithm
MD2 - takes a data input of any length and produces a hash output of 128 bits.
MD4 - Fast algorithm, subject to more attacks
MD5 - collision attacks, can be computed in eight hours
SHA - Secure Hash Algorithm, a set of hash algorithms designed by NIST(national institute and technology)
SHA 1 - used to secure hashing in DSS (Digital Signature Standard). Creates message digests 160 bits long, used in DSA (Digital Signature Algorithm) to later be used as the signature of the message
SHA function - does all hashing functions, applies a compression function to the data input. Works in block mode, seperates data into words first, then groups words into blocks.
SHA1 modeled? MD4
SHA-2 - padding is added, no known collision attacks against SHA-256
what is sha2 vunerable to? reduced-round SHA-256
SHA 3 - Algorithm different from previous. Resistant to attacks that are successful to them.
RIPEMD - RACE Integrity Primitives Evaluation Message Digest, a hashing fucntion. Has problems with collisions.
RIPEMD-160 - algorithm based MD4, uses two parallel channels with 5 rounds.
Symmetric Encryption - both sender and receiver of message have previously obtained the same key.(shared key)
Shared secret - shared key to decrypt a encrypted message
DES - Data Encryption Standard, block cipher, segments input data into blocks of a specified size, padding last block to make it a multiple of the block size required. Key used for both encryption
3DES - uses three keys, spins through DES algorithm 3 times(multiple encryption). Plaintext encypted by DES then encrypting first ciphertext with a different key, then encrypting second cipher text with third key, not good for low powered devices.
AES - provides stream cipher function to support message authentication, uses Galois Counter Mode(GCM)
RC - Rivest Cipher,
RC2 - a variable-key-size blockmode cipher. Breaks input blocks into four 16 bit words, puts them through 18 rounds of mix/mash operations, outputs 64 bits of ciphertext for 64 bits of plaintext
RC5 - block cipher, multiple variable elements, number of rounds, key sizes, and block sizes
RC6 - Uses count of 20 rounds and 3 possible key sizes.
RC4 - Stream cipher, enciphers the plaintext in a stream, bit by bit. faster than block ciphers.
Blowfish - block mode cipher, encryption done by seperating the 64bit input block into 32 bit words, function executed every round
Twofish - block cipher, utilizes 128-blocks with variable length key 256. Uses 16 rounds and splits key mateial into two sets. One to perform encyption the other to load into the algorithms s boxes
IDEA - International Data Encryption Algorithm, block mode cipher using 64 bit block size and 128 bit key. process uses eight rounds, with final four step process. Last step concatenated to form ciphertext.
ChaCha20 - uses 256 bit key and 96 bit nonce and uses 20 rounds. Built using AEAD, authenticated encryption with assocaiated Data.
Cipher Modes
ECB - Eletronic Codebook, simplest mode operation of all, message divided into blocks, each block encrypted separately.
CBC - Cipher Block Chaining, defined as a block mode where each block is XORed with the previous ciphertext block before being encrypted.
Counter Mode (CTM) - Uses a “Counter” function to generate a nonce that is used for each block encryption.