Cryptography Basics Quiz
53 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term 'cryptography' originally mean?

  • Digital encryption
  • Code generation
  • Secure communication
  • Hidden writing (correct)
  • Which goal of cryptography ensures that messages remain unaltered during transmission?

  • Integrity (correct)
  • Authentication
  • Confidentiality
  • Encryption
  • What is the meaning of 'ciphertext' in cryptography?

  • The original readable message
  • The encrypted algorithm
  • The key used for encryption
  • The encoded message (correct)
  • According to Kerckhoffs' Principle, what should a cryptographic system rely on for its security?

    <p>The secrecy of the key</p> Signup and view all the answers

    What is the role of the 'key' in the cryptographic process?

    <p>To convert plaintext into ciphertext</p> Signup and view all the answers

    Which of the following is NOT one of the main goals of cryptography?

    <p>Transaction speed</p> Signup and view all the answers

    What does confidentiality in cryptography aim to achieve?

    <p>Preventing unauthorized access</p> Signup and view all the answers

    What is plaintext in the context of cryptography?

    <p>The unencrypted readable message</p> Signup and view all the answers

    What role does Alice play in the communication process?

    <p>Alice encrypts and Bob decrypts</p> Signup and view all the answers

    In the context of symmetric ciphers, what is the primary function of encryption?

    <p>To convert plaintext into ciphertext</p> Signup and view all the answers

    What type of data does Bob read after Alice encrypts her message?

    <p>Ciphertext</p> Signup and view all the answers

    Which of the following is NOT a characteristic of symmetric ciphers?

    <p>They require a separate key for each message</p> Signup and view all the answers

    During the encryption process, what does Alice use to secure her message?

    <p>A symmetric key</p> Signup and view all the answers

    How does Bob ensure that he can read Alice's message?

    <p>By using the same symmetric key as Alice</p> Signup and view all the answers

    Which term describes the output of the encryption process?

    <p>Ciphertext</p> Signup and view all the answers

    What is the primary security risk associated with symmetric ciphers?

    <p>Key exposure</p> Signup and view all the answers

    If $p$ divides $M$, which statement about $M * (M^{q-1} k * (p-1))$ is correct?

    <p>It is always congruent to $M$ modulo $p$.</p> Signup and view all the answers

    What is implied if $q$ does not divide $M$ in the context of $M * (M^{q-1} k * (p-1))$?

    <p>Then $M * (M^{q-1} k * (p-1))$ is congruent to $M$ modulo $q$.</p> Signup and view all the answers

    In the equation $q\ |\ M * (M^{q-1} k * (p-1)) - M$, which factor must also divide the outcome?

    <p>$p$ must divide the outcome.</p> Signup and view all the answers

    What can be concluded if $M * (M^{q-1} k * (p-1)) \equiv M \ (mod \ p * q)$?

    <p>The congruence holds due to the factors of $M$.</p> Signup and view all the answers

    What aspect of digital signatures allows verification of the sender's identity?

    <p>A digital signature relies on a secret key that only the sender possesses.</p> Signup and view all the answers

    What type of attack involves only having access to ciphertexts?

    <p>Ciphertext-only</p> Signup and view all the answers

    What does IND-CPA stand for in the context of cryptography?

    <p>Indistinguishability under chosen plaintext attack</p> Signup and view all the answers

    What is the primary function of a transposition cipher?

    <p>It shuffles the order of characters.</p> Signup and view all the answers

    What characteristic is fundamental for a cryptographic system to be considered semantically secure?

    <p>IND-CPA property</p> Signup and view all the answers

    What differentiates symmetric ciphers from asymmetric ciphers?

    <p>Symmetric ciphers utilize a single key for both encryption and decryption.</p> Signup and view all the answers

    Who proposed the equivalence between IND-CPA and semantic security?

    <p>Shafi Goldwasser and Silvio Micali</p> Signup and view all the answers

    Which of the following describes an elliptic curve?

    <p>A set of points satisfying an equation with two variables where one has degree three</p> Signup and view all the answers

    Which of the following describes a polyalphabetic substitution cipher?

    <p>Employs a keyword to create multiple shifting alphabets.</p> Signup and view all the answers

    Which equation represents a simple example of an elliptic curve?

    <p>y = x^3 + ax + b</p> Signup and view all the answers

    In the Caesar Cipher, how is the plaintext transformed into ciphertext?

    <p>By substituting letters based on a specific shift.</p> Signup and view all the answers

    What is a key feature of symmetric ciphers?

    <p>They are generally less computationally intensive.</p> Signup and view all the answers

    In terms of cryptography, what implication does the statement P ≠ NP have?

    <p>It suggests a correlation but does not prove cryptographic security</p> Signup and view all the answers

    Which of the following types of attacks allows an attacker to choose which plaintexts are encrypted?

    <p>Chosen-plaintext</p> Signup and view all the answers

    What determines the ciphertext alphabets in a Vigenère Cipher?

    <p>A keyword provided by the user.</p> Signup and view all the answers

    Which statement is true regarding monoalphabetic substitution ciphers?

    <p>They replace each letter consistently throughout the text.</p> Signup and view all the answers

    Which of the following best describes the Skytale cipher?

    <p>It wraps a leather strip around a wooden staff for encryption.</p> Signup and view all the answers

    What is the main disadvantage of symmetric ciphers?

    <p>The requirement to share the symmetric key securely.</p> Signup and view all the answers

    In the context of ciphers, what does the term 'block ciphers' refer to?

    <p>Ciphers that operate on fixed-length groups of bits or characters.</p> Signup and view all the answers

    What are the two keys used in asymmetric ciphers?

    <p>Private key and public key</p> Signup and view all the answers

    What is a potential vulnerability of asymmetric ciphers?

    <p>Vulnerable to a Man-in-the-Middle attack</p> Signup and view all the answers

    What is the purpose of the public key in asymmetric encryption?

    <p>To encrypt messages</p> Signup and view all the answers

    Which of the following is true about RSA?

    <p>It is based on the factorization of large primes</p> Signup and view all the answers

    In RSA, what does the variable 'N' represent?

    <p>The product of two prime numbers</p> Signup and view all the answers

    What condition must 'e' satisfy in the RSA key generation process?

    <p>It must be coprime to φ(N)</p> Signup and view all the answers

    What does the symbol 'φ(N)' represent in RSA?

    <p>The number of integers less than N that are coprime to N</p> Signup and view all the answers

    What is the process of decrypting a message in RSA?

    <p>Calculating C mod N using the private key</p> Signup and view all the answers

    Which of the following pairs represents a complete RSA key pair?

    <p>(d, N) and (e, N)</p> Signup and view all the answers

    Which prime numbers did Alice choose in her example of RSA key generation?

    <p>11 and 13</p> Signup and view all the answers

    Which equation represents the encryption process in RSA?

    <p>$C = M^e$</p> Signup and view all the answers

    What is one disadvantage of asymmetric encryption compared to symmetric encryption?

    <p>It requires more computational resources</p> Signup and view all the answers

    What must Alice do to ensure the confidentiality of her private key in RSA?

    <p>Keep it secret at all costs</p> Signup and view all the answers

    Which of the following best describes the encryption process in the RSA example given?

    <p>The message is encrypted using the public key exponent</p> Signup and view all the answers

    Study Notes

    Cryptography

    • Cryptography originally meant "hidden writing" (κρυπτός: hidden, γράφειν: write) in ancient Greek.
    • Nowadays, encryption makes a message unreadable/inaccessible to outsiders.

    Basics

    • Plaintext (M): Original message
    • Ciphertext (C): Encrypted message
    • Key (k): Secret information used for encryption/decryption

    Goals of Cryptography

    • Confidentiality: Keeping messages secret while communicating over insecure mediums (e.g., the internet).
    • Integrity: Ensuring message content hasn't been altered.
    • Authentication: Verifying the sender's identity.

    Kerckhoffs' Principle

    • A cryptographic system must be indecipherable.
    • A cryptographic system must remain secure even if everything about it (except the secret key) is publicly known.
    • Security should not rely on secrecy alone.

    Algorithms

    • Cryptography can be categorized into:
      • Classic ciphers: Operate on characters, uses transposition and substitution
        • Transposition ciphers (e.g., Skytale): Reordering the characters
        • Substitution ciphers: Replacement of characters (Monoalphabetic and Polyalphabetic)
      • Modern ciphers: Operate on bits/numbers, use symmetric and asymmetric
        • Symmetric ciphers: Same key for encryption and decryption (e.g., AES, DES, Blowfish)
          • Block ciphers: Process plaintext in blocks of equal size.
          • Stream ciphers: Process plaintext bit by bit.
          • Modes of operation (E.g. Electronic Codebook Mode (ECB), Cipher Block Chaining (CBC)).
        • Asymmetric ciphers: Different keys for encryption and decryption (e.g., RSA, ElGamal).
          • Public key for encryption; Private key for decryption.
          • High computational cost.
            • Easy key distribution.

    Diffie-Hellman Key Exchange

    • Invented in 1976 by Whitfield Diffie and Martin Hellman.
    • A method for securely exchanging secret keys over an insecure medium.
    • Key distribution problem (i.e., creating n2 keys for n people)
    • Expensive computation over groups
    • Vulnerable to man-in-the-middle attacks.

    Asymmetric Ciphers: RSA

    • Widely used asymmetric cipher based on large prime factorization.
    • Invented in 1977 at MIT by Ron Rivest, Adi Shamir, and Leonard Adleman.
    • Public Key: (e, N)
    • Private Key (d, N) Encryption: C = Me mod N, M < N Decryption: M = Cd mod N
    • Key generation process:
      • Choose two large prime numbers (p, q).
      • Calculate N = p * q and φ(N).
      • Choose an integer e that is coprime to φ(N) and 1 < e < φ(N).
      • Calculate d such that e * d = 1 (mod φ(N)).

    Digital Signatures

    • Verifying the sender's identity and message integrity.
    • Only the sender can create a valid signature.
    • The signature can be verified by the recipient.
    • A signature belongs to one message only.

    Message Digests

    • Compress input into a fixed-length output.
    • No keys involved.
    • Properties: -One-wayness: Hard to find the original input from the digest.
      • Collision resistance: Difficult to find two different inputs with the same digest.

    Message Authentication Codes (MAC)

    • Verifying message integrity and sender's authenticity

    Hybrid Ciphers

    • Combining symmetric and asymmetric ciphers.
    • Use asymmetric encryption for exchanging the symmetric key, then encrypt data symmetrically to speed up the process.
      • (e.g., HTTPS/TLS, Mail encryption)

    Cryptography in Practice

    • Cryptographic software libraries: (e.g., Java, C/C++, C#)
    • Avoid obsolete cryptographic algorithms. (e.g., DES, Blowfish, MD5, SHA-1)
    • Utilize secure random number generators.

    Theory of Cryptography

    • Security in cryptography: Means an attacker cannot extract plaintext information from the ciphertext.
    • Different cryptographic attacks (e.g. Ciphertext-only, Known-plaintext, Chosen-plaintext, Chosen-ciphertext)
    • Semantic Security: Ensuring an attacker cannot gain any information about the plaintext even by knowing the ciphertext and the public key. (IND-CPA)
    • No deterministic asymmetric cryptographic system is semantically secure.

    Elliptic Curve Cryptography (ECC)

    • Elliptic curves are not functions but sets of points that satisfy a particular equation (e.g. y2 = x3 + ax + b).
    • Symmetric with respect to the X-axis.
    • Points are cut by a non-horizontal line exactly one or three times.
    • Define an operation on an elliptic curve by drawing a straight line through two points. The point where the line intersects the curve again and the vertical line drawn from the point where that line intersected define a new point.
    • Doubling a point on the curve. Also works in the same manner, but with slight modification.
    • Computing is rather easy.
    • Finding n is hard (i.e., discrete logarithm)
    • Can be used in different ciphers, e.g., ElGamal.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the fundamental concepts of cryptography. This quiz covers definitions, goals, and principles such as Kerckhoffs' Principle, as well as the roles of encryption and keys in secure communication. Perfect for anyone wishing to understand the basics of secure messaging and data protection.

    More Like This

    Cryptography Quiz
    4 questions

    Cryptography Quiz

    LucrativeMagenta avatar
    LucrativeMagenta
    Blockchain Principle Quiz
    29 questions
    Use Quizgecko on...
    Browser
    Browser