Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
- 3rd side (hint)
Goals of cryptography |
P- Privacy( Confidentiality) A- Authentication I- Integrity N- Non-Repudiation |
|
|
Cryptography |
Art of converting plain text to cipher Text
Cryptanalysis: Art of breaking the cipher
Cryptology: science of cryptography and cryptanalysis
Cryptosystem: implementation of code / cipher in hardware or software.
|
|
|
Encryption |
Plaintext+Algorithm+key= cipher text |
|
|
Zero knowledge proof |
Sharing a proof without sharing actual knowledge |
|
|
Transposition cipher |
Rearranging the letters of plain text |
|
|
Substitution cipher |
Replace each character or bit with different character |
E.g: vigenere cipher ( polyalphabatic cipher) |
|
One time pads |
Key length should be equal to length of the message. Must be randomly generated Must be physically protected Must be used only once Types of substitution cipher( Vernam Cipher). |
Exam tip: when used properly , they are unbreakable) |
|
Running cipher |
Where encryption key is equal to the length of the message. ( Key is chosen from a book or newspaper) |
|
|
Monoalphabetic cipher Polyalphabatic cipher |
Monoalphabetic cipher : use one alphabet Polyalphabatic cipher: uses two or more alphabets. |
|
|
Kerckhoff's principle |
Only the key should be kept secret. Algorithm should be publicly known. |
|
|
Confusion |
Hide the relationship b/w the cipher text and the secret key. Complication is substitution cipher. |
|
|
Diffusion |
One change in plain text, change the cipher text in multiple ways. |
|
|
Caesar Cipher |
Monoalphabetic rotation cipher. Key is no of places to shift in alphabet.
Exam tip: vulnerable to frequency analysis attack, that analyze the rate at which specific letter appears. |
|
|
Vigenere cipher: |
Polyalphabatic cipher . Alphabets repeated 26 times in a vigenere square |
|
|
Digital signature |
A hash value encrypted with a private key. Digitally signed messages assure the recipient that the message truly came from the claimed sender. It enforce Non-Repudiation. |
|
|
Digital certificate |
Version of x.509 to which the certificate confirms
Serial number
Signature algorithm identifier Issuer name Validity period Subjects name Subjects public key
|
|