Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
Keys
|
Secret sequence of bits and instructions that governs the act of encryption and decryption.
|
|
Breaking Ciphers
|
Brute Force attack and Short Cut attack
|
|
Brute Force Attack
|
Decrypt the ciphertext with all keys
•If you can recognize the plaintext when it appears you’re done •For most ciphers all keys, except the correct one, will decrypt a ciphertext to garbage |
|
Short Cut Attack
|
Any attack that takes less effort than a brute force attack.
Usually uses "known plaintext" i.e. a part of the message that is already known. |
|
One-Time Cipher Pad
|
This observation leads to key requirements for an unbreakable cipher
–The key is random –The key is as long as the message –The key is only used for one message •If a cipher meets these requirements it is called a One-Time Pad |
|
Substitution transformations vice Permutation transformations
|
Permutation is the rearranging or permuting (transposition) the bits of a message instead of changing, or substituting them. For example when writing a message backwards.
|
|
Relationship between the length of binary keys and the Brute Force Attack
|
The amount of keyspace determines how long the attack needs to run through every possible key.
A worst case Brute Force Attack that tries all combinations of all 3 DES keys takes 2^56*2^56*2^56= 2^168total iterations• |
|
DES
|
Symmetric cipher. 56 bit
|
|
3-Key Triple DES
|
Triple DES is 168 bit.
|
|
AES
|
The Rijndael algorithm was selected to be the AES
•The Rijndael design addresses –resistance to all known attacks –speed and code compactness –design simplicity 128-bit block lengths are approved for the AES |
|
Block cipher modes
|
Divides a message into blocks of bits as plain text, placed into mathematical functions and outputs as cipher text.
ECB - Electronic Code Book (used for small amounts of data) CBC - Cipher Block Chaining Mode (used for lots of data) CTR - Counter mode - produces a stream. |
|
Electronic Code Book Mode
|
each block of plaintext goes into a separate cipher block.
|
|
Cipher Block Chaining Mode
|
takes the output of the 1st encryption and XOR's it into the 2nd bloc.
|
|
Conventional Cryptography
|
General substitution cipher and shift cipher.
|
|
Public key
|
PKI and RSA
|
|
Hash Functions
|
Hashes are complicated checksums that produce long binary strings viewed in hex notation called hash values.
|
|
Hash Function Properties
|
Hash can be applied to any size message.
Produces a fixed size output. Is easy to compute. Given a message M1, it is not computationally feasible to find another message, M2, such that H(M2) = H(M1) 5.Given H(M) you cannot find M |
|
MAC
|
Takes the last block of the cipher block chaining mode and uses that as a checksum
|
|
Public Key Cryptography
|
2 mathematically related keys. Data is encrypted with one key and decrypted with the other.
|
|
RSA Short Cut Attack
|
Use the factor of the modulus which is the same for the public and private keys
|
|
Conventional cryptography
|
Encrypt and decrypt with the same key.
Conventional ciphers are fast, between 1,000 and 10,000 times faster than public key ciphers •Key distribution is the difficult part of conventional cryptography!!! |
|
Secret Key Cryptography
|
Common name for Conventional cryptography
|
|
Shared Key Cryptography
|
Common name for Conventional cryptography.
|
|
Private Key Cryptography
|
Common name for Conventional cryptography.
|
|
Single Key Cryptography
|
Common name for Conventional cryptography.
|
|
Symmetric cryptography
|
Common name for Conventional cryptography.
|
|
Secret Keys
|
Sender and receiver use two instances of the same key for encryption and decryption.
|
|
Public Key cryptography
|
It was proposed to solve two problems
–Simplify the distribution of keys –Enable the creation digital signatures Public key cryptography is often called “asymmetric key”cryptography since it uses two different keys •One of the 2 keys is called a public key and •the other is called a private key The 2 keys are mathematically related •Data is encrypted with one key •And decrypted with the other key •That is it!!! |
|
Asymmetric key cryptography
|
PKI - uses public and private keys
|
|
DES (Data Encryption Standard)
|
Symmetric block encryption.
54 bit key, 64 bits of which 8 bits for parity checking. |
|
AES (Advanced Encryption Standard)
|
Rinjdael. 128(10 rounds) 192(12 rounds) 256(14 rounds).
AES uses 128 |
|
One-Time Pad
|
The key is random
The key is as long as the message The key is only used for one message |
|
Electronic Code Book Mode
|
64 bit.
Each block encrypted with the same key. Fastest and easiest but patterns emerge when encrypting large amounts of data. |
|
Cipher Block Chaining Mode
|
Does not reveal a pattern, because each block of texts, the key, and the value based on the previous block are processed in the algorithm and applied to the next block of text.
Used when lot's of data needs to be encrypted. |
|
2 key Triple DES
|
112 bit key
|
|
3 key triple DES
|
Uses 48 rounds which makes it highly resistant to differential cryptanalysis.
Makes for a heavy performance hit. |
|
MD5
|
Hash function. Message digest of 128 bits
|
|
SHA
|
Secure Hasing, NIST standard, up to 512 bits
|
|
RSA
|
Asymmetric cipher. Most popular public key algorithm.
|
|
Hashing vs. MAC
|
MAC uses a key, hashing does not.
|