• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Goals of cryptography

P- Privacy( Confidentiality)



A- Authentication



I- Integrity



N- Non-Repudiation





Cryptography

Art of converting plain text to cipher Text



Cryptanalysis: Art of breaking the cipher



Cryptology: science of cryptography and cryptanalysis



Cryptosystem: implementation of code / cipher in hardware or software.




Encryption

Plaintext+Algorithm+key= cipher text



Zero knowledge proof

Sharing a proof without sharing actual knowledge

Transposition cipher

Rearranging the letters of plain text

Substitution cipher

Replace each character or bit with different character

E.g: vigenere cipher ( polyalphabatic cipher)

One time pads

Key length should be equal to length of the message.



Must be randomly generated



Must be physically protected



Must be used only once



Types of substitution cipher( Vernam Cipher).

Exam tip: when used properly , they are unbreakable)

Running cipher

Where encryption key is equal to the length of the message.


( Key is chosen from a book or newspaper)

Monoalphabetic cipher



Polyalphabatic cipher

Monoalphabetic cipher : use one alphabet



Polyalphabatic cipher: uses two or more alphabets.

Kerckhoff's principle

Only the key should be kept secret. Algorithm should be publicly known.


Confusion

Hide the relationship b/w the cipher text and the secret key.



Complication is substitution cipher.


Diffusion

One change in plain text, change the cipher text in multiple ways.

Caesar Cipher

Monoalphabetic rotation cipher. Key is no of places to shift in alphabet.



Exam tip: vulnerable to frequency analysis attack, that analyze the rate at which specific letter appears.

Vigenere cipher:

Polyalphabatic cipher . Alphabets repeated 26 times in a vigenere square

Digital signature

A hash value encrypted with a private key.



Digitally signed messages assure the recipient that the message truly came from the claimed sender. It enforce Non-Repudiation.



Digital certificate


Version of x.509 to which the certificate confirms



Serial number



Signature algorithm identifier



Issuer name



Validity period



Subjects name



Subjects public key