chapter6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

0 XOR 0

0

0^0

0

0^1

0

0v0

0

1 XOR 1

0

1^0

0

"X: 0 1 1 0 1 1 0 0 Y: 1 0 1 0 0 1 1 1 __________________________ X ∧ Y:

0 0 1 0 0 1 0 0

0 XOR 1

1

0v1

1

1 XOR 0

1

1^1

1

1v0

1

" "One-time pads

use a different substitution alphabet for each letter of the plaintext message. C = (P + K) mod 26

" Symmetric key cryptosystems

use a shared secret key available to all users of the cryptosystem.

"Transposition ciphers

use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.decryption algorithm simply reverses the encryption transformation to retrieve the original message. Shuffle chars

"Asymmetric cryptosystems

use individual combinations of public and private keys for each user of the system

" Substitution ciphers

use the encryption algorithm to replace each character or bit of the plaintext message with a different character. example: caesar cipher

" "columnar transposition

uses keyword. example: A T T A C K E R 1 7 8 2 3 5 4 6

" OR operation (represented by the __ symbol)

v

"Codes ,

which are cryptographic systems of symbols that represent words or phrases, are sometimes secret, but they are not necessarily meant to provide confi dentiality. xample, a spy might transmit the sentence "The eagle has landed"

" possible way to decrypt the Enigma message

with contemporary technology was to use a similar machine with the same rotor settings used by the transmitting device.

" AND operation (represented by the __ symbol)

" NOT operation (represented by the __ symbol)

∼ or !

1v1

1

"X: 0 1 1 0 1 1 0 0 Y: 1 0 1 0 0 1 1 1 __________________________ X ∨ Y:

1 1 1 0 1 1 1 1

"X: 0 1 1 0 1 1 0 0 Y: 1 0 1 0 0 1 1 1 ___________________________ X XOR Y:

11001011

" Modern cryptographic systems use at least a ___ key to protect data against prying eyes

128-bit

" "8 mod 6 = 6 mod 8 = 10 mod 3 = 10 mod 2 = 32 mod 8 =

2 6 1 0 0

" "period analysis

Although polyalphabetic substitution protects against direct frequency analysis, it is vulnerable to a second-order form of frequency analysis called p eriod analysis , which is an examination of frequency based on the repeated use of the key.

__ vulnerable to a type of attack known as frequency analysis.

Ceasar Cipher

" Asymmetric key encryption can provide___ CIA

Confidentiality, integrity, authentication, and nonrepudiation

"one-time pads rules

Each one-time pad must be used only once.(VENONA) The key must be at least as long as the message to be encrypted. integrity- The one-time pad must be randomly generated. integrity- The one-time pad must be physically protected against disclosure.

"German military-industrial complex adapted a commercial code machine nicknamed __for government use.

Enigma

"CAST' when it is encrypted using the Caesar cipher:

FDVW

" "defi nes the hardware and software requirements for cryptographic modules that the federal government uses.

Federal Information Processing Standard (FIPS)

" Japanese used a similar Enigma machine, known as

Japanese Purple Machine

"Symmetric key cryptography has several weaknesses:

Key distribution is a major problem. Symmetric key cryptography does not implement nonrepudiation The algorithm is not scalable. Keys must be regenerated often.

" ROT12 cipher would turn an A into an

M

" "total number of keys required to completely connect n parties using symmetric cryptography is given by the following formula:

Number of Keys = n*(n-1)/2

" __ are also known as Vernam ciphers

One-time pads

C = (P + 3) mod 26 is caesar cipher encryption function. what will be decryption function

P = (C - 3) mod 26

"___ do not provide this guarantee of nonrepudiation

Secret key, or symmetric key, cryptosystems (such as simple substitution ciphers)

__can also be called secret key cryptography and private key cryptography.

Symmetric key cryptography

" "Two main types of cryptosystems enforce confi dentiality.

Symmetric key cryptosystems Asymmetric cryptosystems

" Caesar Cipher

To encrypt a message, you simply shift each letter of the alphabet three places to the right. For example, A would become D , and B would become E .

"top-secret effort known by the code name __ to attack the Enigma codes

Ultra

"major strengths of asymmetric key cryptography

Users can be removed far more easily from asymmetric systems. The addition of new users requires the generation of only one public-private key pair. Key regeneration is required only when a user's private key is compromised. Asymmetric key encryption can provide integrity, authentication, and nonrepudiation Key distribution is a simple process. No preexisting communication link needs to exist

Caesar Cipher - XYZ represents?

X becomes A , Y becomes B , and Z becomes C .

" running key cipher (also known as

a book cipher

one-time pad is example of

a stream cipher

" "transposition ciphers are examples of __ ciphers

block

" Usually the time and effort required to perform a complete ___ attack against an encryption system is what the work function represents

brute-force

possible way of attack on one way hash

bruteforce algorithm

" Codes vs Ciphers

codes work on words and phrases whereas ciphers work on individual characters and bits.

"Security practitioners use cryptographic systems to meet four fundamental goals:

confidentiality, integrity, authentication, and nonrepudiation.

primarily employed to perform bulk encryption and provides only for the security service of ___ CIA ?

confidentiality.

substitution introduces __ and the transposition introduces ___

confusion & diffusion

Cryptographic algorithms rely on two basic operations to obscure plaintext messages—

confusion and diffusion.

The art of creating and implementing secret codes and ciphers is known as

cryptography

"Together, cryptography and cryptanalysis are commonly referred to as

cryptology

" "Specifi c implementations of a code or cipher in hardware and software are known as

cryptosystems

" Message integrity is enforced through the use of encrypted message digests, known as

digital signatures created upon transmission of a message

Asymmetric key algorithms

each user has two keys: a public key, which is shared with all users, and a private key, which is kept secret and known only to the user.

"Cryptography ensures __ CIA

ensure confi dentiality, integrity, authentication, and nonrepudiation.

initialization vector (IV)

examples of a nonce.a random bit string that is the same length as the block size and is XORed with the message.

" The major strength of symmetric key cryptography

great speed at which it can operate. Symmetric key encryption is very fast, often 1,000 to 10,000 times faster than asymmetric algorithms.

"Asymmetric key algorithms encryption decryption

if the public key encrypts a message, then only the corresponding private key can decrypt it, and vice versa.

_ are used to create unique ciphertext every time the same message is encrypted using the same key.

initialization vector (IV)

" one-way function

is a mathematical operation that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values

nonce

is a random number that acts as a placeholder variable in mathematical functions. nonce must be a unique number each time it is used.

Kerchoff principle

is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge

"no. of participants = 10. How many keys required for symmetric and Asymmertric

Asymmetric = 20 Symmetric = 10*(10-1)/2 = 45

" "__ provide a key revocation mechanism that allows a key to be canceled, effectively removing a user from the system.

Asymmetric cryptosystems

" "___ provide a key revocation mechanism that allows a key to be canceled, effectively removing a user from the system.

Asymmetric cryptosystems

___ cryptography is scaleable

Asymmetric cryptosystems

" ___ algorithms also provide support for digital signature technology.

Asymmetric key

___ also known as public key algorithms

Asymmetric key algorithms

"Caesar cipher also became known as the __ cipher.

ROT3 (or Rotate 3)

major weakness of public key cryptography is __

its slow speed of operation

Caesar cipher, Vigenère cipher, and one-time pad sound very similar. They are! The only difference is the ___

key length.Caesar shift cipher uses a key of length one, the Vigenère cipher uses a longer key (usually a word or sentence), and the onetime pad "uses a key that is as long as the message itself."

is the range of values that are valid for use as a key for a specifi c algorithm

key space - defined in bit size

" All cryptographic algorithms rely on __to maintain their security.

keys

" "Enigma

machine used a series of three to six rotors to implement an extremely complicated substitution cipher.

" "work function or work factor

measure the strength of a cryptography system by measuring the effort in terms of cost and/or time

" total number of keys required to completely connect n parties using Asymmetric cryptography is given by the following formula:

n*2

Diffusion

occurs when a change in the plain text results in multiple changes spread throughout the ciphertext.

Confusion

occurs when the relationship between the plain text and the key is so complicated that an attacker can't merely continue altering the plain text and analyzing the resulting ciphertext to determine the key.

"Block ciphers

operate on "chunks," or blocks, of a message and apply the encryption algorithm to an entire message block at the same time

" Stream ciphers

operate on one character or bit of a message (or data stream) at a time

"Vigenère cipher

polyalphabetic substitution cipher system is the Vigenère cipher. The Vigenère cipher uses a single encryption/decryption chart. ROWS : Plain text letter: Columns: Key letter Cell: Cipher letter

Cryptography provides added levels of security to data during

processing, storage, and communications.

Integrity can be enforced by both __ key cryptosystems.

public and secret

" "Nonrepudiation is offered only by

public key, or asymmetric, cryptosystems,

Symmetric key algorithms

rely on a "shared secret" encryption key that is distributed to all members who participate in the communications. This key is used by all parties to both encrypt and decrypt messages, so the sender and the receiver both possess a copy of the shared key.

XOR function

returns a true value when only one of the input valuesis true

the study of methods to defeat codes and ciphers

ryptanalysis

" Ceasar Cipher decrypt the message

simply shift each letter three places to the left.

"This separation of duties and two-person control contained in a single solution is called ___

split knowledge. best example of split knowledge is seen in the concept of key escrow

Caesar cipher is an example of a r

stream cipher

"three types of algorithms

symmetric encryption algorithms, asymmetric encryption algorithms, and hashing algorithms


संबंधित स्टडी सेट्स

IT 477 - Final Exam Review - Multiple Choice

View Set

Chapter 4 Ethics and Social Responsibility in Marketing

View Set

Chapter 21- Patient Safety and Quality

View Set

Chapter 4- Ethics and Information Security: MIS Business Concerns

View Set