Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
Block Ciphers
|
sequence of permutation and substitution ciphers
|
|
Electronic Codebook Mode (ECB)
|
Identical blocks result in identical ciphertext; blocks are encrypted independently; no error propagation
|
|
Cipherblock Chaining Mode (CBC)
|
same plaintexts = same ciphertexts if same key and IV used. Each section depends on the one before it.
|
|
Cipher Feedback Mode (CFB)
|
same plaintexts = same ciphertexts if same key and IV used; chaining happens. idk how the errors work
|
|
Output Feedback Mode (OFB)
|
same plaintexts = same ciphertexts if same key and IV used; plaintext-independent preceding blocks; error in one bit affects only its decryption
|
|
Counter Mode (CTR)
|
same plaintexts = same ciphertexts if same key and nonce used; no chaining; system recovers from ciphertext bit errors
|
|
Public-Key Encryption
|
Incoming messages would have been encrypted with the recipient's public key and can only be decrypted with his corresponding private key.
|
|
Merkle Hellman Cryptosystem
|
public private key, uses knapsacks
|
|
merkle hellman key generation
|
make an easy knapsack as a private key; make public key by turning it into a difficult knapsack
|
|
merkle hellman encryption
|
pack knapsack; comput the ssum of knapsack using public key.
|
|
merkle hellman decryption
|
Transform the sum of the knapsack and solve the respective knapsack problem using the private key.
|
|
RSA
|
generate 2 large prime, p,q; compute n=pq and o=(p-1)(q-1); select random int e .: 1 < e < o .: gcd(e, o) = 1; compute d .: 1 < d < o .: = 1 mod (o); A's public key is (n,e); private is d.
|
|
RSA encryption
|
B encrypts message M for A by taking A's public key and running computations on m based on A, then sends ciphertex to A
|
|
RSA decryption
|
Use private key d to find m = c^d mod n.
|
|
Symmetric Key Cryptography
|
keys for decryption and encryption are exactly the same shared secret.
|
|
TTP
|
Trusted Third Party
|
|
Properties of acryptographic hash function
|
pre-image resistance; second pre-image resistance; collision resistance
|
|
How to encrypt with RSA (n=33, e=3, d=7)
|
m=5 -> c=5^3 mod 33 = (25*5) mod 33 = 26
|
|
How to compute RSA signature (n=33, d=7)
|
m=4 -> s = 4^7 mod 33 = 16
|