• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
Keys
Secret sequence of bits and instructions that governs the act of encryption and decryption.
Breaking Ciphers
Brute Force attack and Short Cut attack
Brute Force Attack
Decrypt the ciphertext with all keys
•If you can recognize the plaintext when it appears you’re done
•For most ciphers all keys, except the correct one, will decrypt a ciphertext to garbage
Short Cut Attack
Any attack that takes less effort than a brute force attack.
Usually uses "known plaintext" i.e. a part of the message that is already known.
One-Time Cipher Pad
This observation leads to key requirements for an unbreakable cipher
–The key is random
–The key is as long as the message
–The key is only used for one message
•If a cipher meets these requirements it is called a One-Time Pad
Substitution transformations vice Permutation transformations
Permutation is the rearranging or permuting (transposition) the bits of a message instead of changing, or substituting them. For example when writing a message backwards.
Relationship between the length of binary keys and the Brute Force Attack
The amount of keyspace determines how long the attack needs to run through every possible key.
A worst case Brute Force Attack that tries all combinations of all 3 DES keys takes 2^56*2^56*2^56= 2^168total iterations•
DES
Symmetric cipher. 56 bit
3-Key Triple DES
Triple DES is 168 bit.
AES
The Rijndael algorithm was selected to be the AES
•The Rijndael design addresses
–resistance to all known attacks
–speed and code compactness
–design simplicity
128-bit block lengths are approved for the AES
Block cipher modes
Divides a message into blocks of bits as plain text, placed into mathematical functions and outputs as cipher text.

ECB - Electronic Code Book (used for small amounts of data)
CBC - Cipher Block Chaining Mode (used for lots of data)
CTR - Counter mode - produces a stream.
Electronic Code Book Mode
each block of plaintext goes into a separate cipher block.
Cipher Block Chaining Mode
takes the output of the 1st encryption and XOR's it into the 2nd bloc.
Conventional Cryptography
General substitution cipher and shift cipher.
Public key
PKI and RSA
Hash Functions
Hashes are complicated checksums that produce long binary strings viewed in hex notation called hash values.
Hash Function Properties
Hash can be applied to any size message.
Produces a fixed size output.
Is easy to compute.
Given a message M1, it is not computationally feasible to find another message, M2, such that H(M2) = H(M1)
5.Given H(M) you cannot find M
MAC
Takes the last block of the cipher block chaining mode and uses that as a checksum
Public Key Cryptography
2 mathematically related keys. Data is encrypted with one key and decrypted with the other.
RSA Short Cut Attack
Use the factor of the modulus which is the same for the public and private keys
Conventional cryptography
Encrypt and decrypt with the same key.
Conventional ciphers are fast, between 1,000 and 10,000 times faster than public key ciphers
•Key distribution is the difficult part of conventional cryptography!!!
Secret Key Cryptography
Common name for Conventional cryptography
Shared Key Cryptography
Common name for Conventional cryptography.
Private Key Cryptography
Common name for Conventional cryptography.
Single Key Cryptography
Common name for Conventional cryptography.
Symmetric cryptography
Common name for Conventional cryptography.
Secret Keys
Sender and receiver use two instances of the same key for encryption and decryption.
Public Key cryptography
It was proposed to solve two problems
–Simplify the distribution of keys
–Enable the creation digital signatures
Public key cryptography is often called “asymmetric key”cryptography since it uses two different keys
•One of the 2 keys is called a public key and
•the other is called a private key
The 2 keys are mathematically related
•Data is encrypted with one key
•And decrypted with the other key
•That is it!!!
Asymmetric key cryptography
PKI - uses public and private keys
DES (Data Encryption Standard)
Symmetric block encryption.
54 bit key,
64 bits of which 8 bits for parity checking.
AES (Advanced Encryption Standard)
Rinjdael. 128(10 rounds) 192(12 rounds) 256(14 rounds).
AES uses 128
One-Time Pad
The key is random
The key is as long as the message
The key is only used for one message
Electronic Code Book Mode
64 bit.
Each block encrypted with the same key.
Fastest and easiest but patterns emerge when encrypting large amounts of data.
Cipher Block Chaining Mode
Does not reveal a pattern, because each block of texts, the key, and the value based on the previous block are processed in the algorithm and applied to the next block of text.

Used when lot's of data needs to be encrypted.
2 key Triple DES
112 bit key
3 key triple DES
Uses 48 rounds which makes it highly resistant to differential cryptanalysis.
Makes for a heavy performance hit.
MD5
Hash function. Message digest of 128 bits
SHA
Secure Hasing, NIST standard, up to 512 bits
RSA
Asymmetric cipher. Most popular public key algorithm.
Hashing vs. MAC
MAC uses a key, hashing does not.