Cryptographic Concepts (part 1) Flashcards

1
Q

Define cryptography.

A

Cryptography is the study of mathematical technique related to the aspects of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 main properties of information security?

What about a 4th?

A
  1. confidentiality - you want to keep things secret; don’t want others to know what you are emailing
  2. data integrity - don’t want someone to intercept your email and modify it before it arrives at the recipient, or you want the recipient to be able to tell that it was modified
  3. data origin authentication - want to be able to verify that the sender actually sent us the message that we received
  4. entity authentication - verify who you are talking to; just because someone logged in with your password doesn’t mean it was you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does cryptography enforce the following properties of information security?

  1. Confidentiality
  2. Data Integrity
  3. Data Origin Authentication
  4. Entity Authentication
A
  1. Encrypt your data, hoping no one else but the receipient(s) can decrypt it.
  2. Use a cryptographic hash function, which generates a specific hash based on the data. If any bit of the data has changed, then the hash changes, so you know the data has altered.
  3. To know that a document came from the person you think it did, they have to sign it with a digital signature.
  4. To authenticate someone, you need cryptographic protocols to identify that someone is who they say they are. Not just that they know the account username and password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define non-repudiation.

A

A digital signature has the property of non-repudiation, which prevents an entity from denying previous commitments or actions.

(i.e. Once you’ve sent an email, you cannot deny that it was you who sent it. There is mathematical proof!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define symmetric key encryption.

A

Symmetric key encryption is when the secret key used by the sender and receiver is the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two basic types of cryptography?

A
  1. Transposition (or permutation) ciphers, where you rearrange the letters in a seemingly random, but reversible manner, to create the ciphertext.
  2. Substitution ciphers, where you map the letters to other letters to create the ciphertext.

(Substitution is the predominant form of encryption. But just because permutation ciphers are weak doesn’t mean they’re useless. There will be times when we use a permutation cipher as a part of a larger, more complicated cipher.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define one-to-one.

A

A function is 1-1 if each element in the codomain Y is the image of at most one element in the domain X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definie onto.

A

A function is onto if each element in the codomain Y
is the image of at least one element in the domain X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define bijection.

A

A function is a bijection if it is one-to-one and onto.

i.e. every element in the domain maps to a unique element in the codomain; so X and Y are the same size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a one-way function.

[MEMORIZE THE EXACT WORDING OF THIS DEFINITION]

A

A one-way function should be:

  • Easy to compute the f(x) values for all values of x.
  • Computationally infeasible to calculate the x values for all values of y.

[When you are writing an encryption function to generate ciphertext, you want your encryption function to be a one-way function.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a trapdoor one-way function.

A

(So given the trapdoor information, for any y you can compute an x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the unique factorization problem?

A

This is the problem of factoring the product of two large prime numbers.

(It turns out that this is one of the hardest problems in mathematics, which is why RSA is so difficult to crack. Many trapdoor-oneway functions used in cryptography are baseed off of this problem.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define a permutation.

A

Let S be a finite set of elements. A permutation p on S is a bijection from S to itself, (i.e. p: S –> S).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you compute the inverse of a permutation function?

A

Simply reverse the arrows in the function mapping and switch the columns.

(The inverse permutation function will also be a permutation function, since it will map S back to S.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you programmatically compute the inverse permutation function array from a permutation array?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Are permutation functions used for public or secret key cryptography? What about trapdoor one-way functions?

A
  • Permutation functions are used for secret key cryptography (i.e. symmetric key cryptography), where the encryption and decryption keys are related in an easy way, and can easily be calculated from one another. (Just compute the inverse permutation function to perform decryption.)
  • Trapdoor one-way functions are used for public key cryptography (i.e. asymmetric key cryptography), since it is computationally infeasible to compute the encryption key, given the decryption key.
17
Q

Define an involution.

A

Involutions are functions that are their own inverses.

18
Q

What do you need to define in order to define an encryption scheme?

A

encryption scheme = cipher

19
Q

What makes an encryption scheme breakable?

A
20
Q

Define the following:

  • physically secured channel
  • unsecured channel
  • secured channel
A
  • A physically secured channel is one which is not physically accessible to the adversary.
  • An unsecured channel is one from which an adversary can reorder, delete, insert, or read.
  • A secured channel is one from which an adversary does not have the ability to reorder, delete, insert, or read.
21
Q

Define what a passive adversary and an active adversary are.

A
  • A passive adversary can read from an unsecured channel.
  • An active adversary can transmit, alter, or delete information on an unsecured channel.
22
Q

What are Knudsen’s 4 categories of breaking an algorithm, in order of decreased severity?

A
23
Q

Define Knudsen’s 4 categories of breaking a security algorithm:

  1. total break
  2. global deduction
  3. instance (or local) deduction
  4. information deduction
A
24
Q

Define cryptanalysis.

A

Cryptanalysis is the study of mathematical techniques for attempting to defeat cryptographic techniques and information security services.

25
Q

Define cryptology.

A

Cryptology is the study of cryptography and cryptanalysis.

(cryptography = designing a cryptosystem)