• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Block Ciphers
sequence of permutation and substitution ciphers
Electronic Codebook Mode (ECB)
Identical blocks result in identical ciphertext; blocks are encrypted independently; no error propagation
Cipherblock Chaining Mode (CBC)
same plaintexts = same ciphertexts if same key and IV used. Each section depends on the one before it.
Cipher Feedback Mode (CFB)
same plaintexts = same ciphertexts if same key and IV used; chaining happens. idk how the errors work
Output Feedback Mode (OFB)
same plaintexts = same ciphertexts if same key and IV used; plaintext-independent preceding blocks; error in one bit affects only its decryption
Counter Mode (CTR)
same plaintexts = same ciphertexts if same key and nonce used; no chaining; system recovers from ciphertext bit errors
Public-Key Encryption
Incoming messages would have been encrypted with the recipient's public key and can only be decrypted with his corresponding private key.
Merkle Hellman Cryptosystem
public private key, uses knapsacks
merkle hellman key generation
make an easy knapsack as a private key; make public key by turning it into a difficult knapsack
merkle hellman encryption
pack knapsack; comput the ssum of knapsack using public key.
merkle hellman decryption
Transform the sum of the knapsack and solve the respective knapsack problem using the private key.
RSA
generate 2 large prime, p,q; compute n=pq and o=(p-1)(q-1); select random int e .: 1 < e < o .: gcd(e, o) = 1; compute d .: 1 < d < o .: = 1 mod (o); A's public key is (n,e); private is d.
RSA encryption
B encrypts message M for A by taking A's public key and running computations on m based on A, then sends ciphertex to A
RSA decryption
Use private key d to find m = c^d mod n.
Symmetric Key Cryptography
keys for decryption and encryption are exactly the same shared secret.
TTP
Trusted Third Party
Properties of acryptographic hash function
pre-image resistance; second pre-image resistance; collision resistance
How to encrypt with RSA (n=33, e=3, d=7)
m=5 -> c=5^3 mod 33 = (25*5) mod 33 = 26
How to compute RSA signature (n=33, d=7)
m=4 -> s = 4^7 mod 33 = 16