Introduction to Cryptography

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What fundamental disciplines intersect in modern cryptography?

  • Mathematics, Computer Science, and Electrical Engineering (correct)
  • Physics, Chemistry, and Biology
  • History, Literature, and Philosophy
  • Economics, Sociology, and Political Science

Which term describes the practice of examining and breaking cryptographic algorithms?

  • Cryptology
  • Encryption
  • Cryptography
  • Cryptanalysis (correct)

If a cryptanalyst possesses the ciphertext of several messages encrypted with the same algorithm and aims to deduce the key to decrypt other messages, what type of attack is being employed?

  • Known-plaintext attack
  • Ciphertext-only attack (correct)
  • Adaptive-chosen-plaintext attack
  • Chosen-plaintext attack

Which of the following is NOT a characteristic or goal associated with cryptography?

<p>Obscurity (D)</p> Signup and view all the answers

In the context of cryptography, what does 'integrity' ensure?

<p>The message remains unaltered during transit. (A)</p> Signup and view all the answers

What is the significance of 'non-repudiation' in the context of cryptography?

<p>Preventing the sender from denying they sent the message. (A)</p> Signup and view all the answers

Which scenario exemplifies a 'known-plaintext attack'?

<p>A cryptanalyst has both ciphertext and the corresponding plaintext of several messages. (D)</p> Signup and view all the answers

In what way does a 'chosen-plaintext attack' differ from a 'known-plaintext attack'?

<p>A chosen-plaintext attack allows the cryptanalyst to select the plaintext to be encrypted. (D)</p> Signup and view all the answers

Which type of cryptanalytic attack involves modifying plaintext choices based on the results of previous encryptions?

<p>Adaptive-chosen-plaintext attack (A)</p> Signup and view all the answers

What is the defining characteristic of a 'restricted algorithm' in cryptography?

<p>Its security relies on keeping the algorithm's workings secret. (A)</p> Signup and view all the answers

What is the primary consideration when selecting an algorithm for encryption?

<p>How difficult it is to break relative to the value and lifespan of the data. (A)</p> Signup and view all the answers

Which of the following best describes the concept of a 'cryptosystem'?

<p>The combination of algorithm, plaintext, ciphertext, key, and key management functions. (C)</p> Signup and view all the answers

What distinguishes a 'computationally secure' algorithm from an 'unconditionally secure' algorithm?

<p>An unconditionally secure algorithm is unbreakable with infinite resources. (A)</p> Signup and view all the answers

In cryptography, what is meant by the term 'keyspace'?

<p>The range of possible values for the key. (A)</p> Signup and view all the answers

What is a primary difficulty associated with secret key cryptography?

<p>The need to securely distribute the key between sender and receiver. (C)</p> Signup and view all the answers

Which of the following is an example of secret key cryptography?

<p>AES (D)</p> Signup and view all the answers

What is a limitation of using a restricted cryptographic algorithm?

<p>It becomes insecure if the algorithm is revealed. (C)</p> Signup and view all the answers

How does a 'block cipher' differ from a 'stream cipher'?

<p>A block cipher encrypts data in groups of bits, while a stream cipher encrypts data one bit at a time. (D)</p> Signup and view all the answers

According to Kerckhoffs's principle, where should the security strength of a cryptosystem primarily reside?

<p>In the complexity of the key. (B)</p> Signup and view all the answers

What is public key cryptography mainly based on?

<p>The concept of using a pair of keys, one for encryption and another for decryption. (D)</p> Signup and view all the answers

In public key cryptography, what term is commonly used to refer to the decryption key?

<p>Private key (A)</p> Signup and view all the answers

Which of the following is correct about the decryption key in public-key cryptography?

<p>It must be kept secret. (B)</p> Signup and view all the answers

Why is it called 'public-key cryptography'?

<p>Because the encryption key can be made public. (C)</p> Signup and view all the answers

How is public key cryptography suited to ensuring confidentiality?

<p>The sender encrypts the message with the receiver's public key. (D)</p> Signup and view all the answers

What mathematical concept is Public Key Cryptography dependent on?

<p>The existence of one way functions. (C)</p> Signup and view all the answers

What is a 'hash function' in the context of cryptography?

<p>A function that maps data of arbitrary size to data of a fixed size. (C)</p> Signup and view all the answers

What property is characteristic of cryptographic hash functions?

<p>Deterministic output (B)</p> Signup and view all the answers

What is the term for data in its original, readable form prior to encryption?

<p>Plaintext (B)</p> Signup and view all the answers

What is the result of applying an encryption algorithm to plaintext?

<p>Ciphertext (B)</p> Signup and view all the answers

Which term collectively describes both cryptography and cryptanalysis?

<p>Cryptology (C)</p> Signup and view all the answers

Which of the following is considered a substitution cipher?

<p>Caesar cipher (D)</p> Signup and view all the answers

How does the decryption process relate to the encryption process in a cryptosystem?

<p>It is the reverse process, converting ciphertext back to plaintext. (A)</p> Signup and view all the answers

What is the function E in the equation E(M) = C?

<p>Encryption function (C)</p> Signup and view all the answers

Which of the following is a polyalphabetic substitution cipher?

<p>Vigenere cipher (C)</p> Signup and view all the answers

How are characters handled in transposition ciphers?

<p>Their order is rearranged. (C)</p> Signup and view all the answers

In a ciphertext attack, what is being attacked?

<p>A key (C)</p> Signup and view all the answers

Which of these historical figures used cryptographic techniques?

<p>Julius Caesar (D)</p> Signup and view all the answers

What is the main goal of cryptography?

<p>To keep messages secret and secure. (C)</p> Signup and view all the answers

Which war saw the use of Navajo windtalkers for secure communication?

<p>World War II (A)</p> Signup and view all the answers

Whom invented the polyalphabetic cipher?

<p>Gilbert Vernam (D)</p> Signup and view all the answers

Flashcards

Cryptography

The art and science of keeping messages secure.

Plaintext

Text in natural, readable form before encryption.

Ciphertext

An encrypted message. Unreadable except by intended recipients.

Encryption

The process of disguising a message to hide its substance.

Signup and view all the flashcards

Decryption

Converting ciphertext back to the original plaintext.

Signup and view all the flashcards

Cryptanalysis

The art and science of breaking ciphertext.

Signup and view all the flashcards

Cryptology

Cryptography and cryptanalysis combined.

Signup and view all the flashcards

Authentication

Ensuring message origin is verifiable; preventing impersonation.

Signup and view all the flashcards

Integrity

Ensuring the message is delivered intact without alteration.

Signup and view all the flashcards

Non-repudiation

Preventing a sender from falsely denying having sent a message.

Signup and view all the flashcards

Cryptographic Algorithm

A mathematical function for encryption and decryption.

Signup and view all the flashcards

Symmetric Algorithm

Uses single key for both encryption and decryption

Signup and view all the flashcards

Asymmetric Algorithm

Uses one key for encryption and another for decryption

Signup and view all the flashcards

Hash Functions

Transformation to irreversibly 'encrypt' information

Signup and view all the flashcards

Secret Key Cryptography

A single key is used for both encryption and decryption.

Signup and view all the flashcards

Public Key Cryptography

Encryption and decryption use different keys, public and private.

Signup and view all the flashcards

One-way Functions

Easy to compute, difficult to reverse. Used in Public Key Cryptography

Signup and view all the flashcards

Hash Function

Function mapping data of arbitrary size to fixed size. Not reversible.

Signup and view all the flashcards

Restricted Algorithm

Algorithm's workings are kept secret.

Signup and view all the flashcards

Attack

Attempted cryptanalysis to break encryption.

Signup and view all the flashcards

Ciphertext-only Attack

Attacker has ciphertext only, aims to recover plaintext/key.

Signup and view all the flashcards

Known-plaintext Attack

Attacker has ciphertext and corresponding plaintext samples.

Signup and view all the flashcards

Chosen-plaintext Attack

Attacker chooses plaintext to be encrypted and gets the ciphertext.

Signup and view all the flashcards

Adaptive-chosen-plaintext Attack

Attacker modifies plaintext choice based on previous encryption results.

Signup and view all the flashcards

Chosen-ciphertext attack

Cryptanalyst can choose different ciphertexts to decrypt, deduce key.

Signup and view all the flashcards

Chosen-key attack

Finding relationship beetween different keys.

Signup and view all the flashcards

Rubber-hose cryptanalysis

Threats, blackmail, or torture to get the key.

Signup and view all the flashcards

Complexity of an Attack

Amount of data, time needed, or memory requirements to break cryptosystem.

Signup and view all the flashcards

Kerckhoffs's Assumption

Algorithm security relies on public knowledge, not hidden inner workings.

Signup and view all the flashcards

Security of Algorithms

Algorithm provides high security if it is difficult to break.

Signup and view all the flashcards

Unconditionally Secure

Secure regardless of available crypto. to recover the plaintext.

Signup and view all the flashcards

Computationally secure

Considered secure if it cannot be broken with available recourses.

Signup and view all the flashcards

Key

Controls the operation of the cryptographic algorithm.

Signup and view all the flashcards

Key space

Range of possible values for Key, in encryption.

Signup and view all the flashcards

Cryptosystem

Algorithm and other methods and functions used to make an operation

Signup and view all the flashcards

Substitution ciphers

A character in the plaintext is replaced

Signup and view all the flashcards

Simple substitution cipher

Each plaintext character is replaced with ciphertext

Signup and view all the flashcards

Homophonic substitution cipher

single character of plaintext can map to one.

Signup and view all the flashcards

Polygram substitution cipher

characters are encrypted in blocks or groups

Signup and view all the flashcards

Polyalphabetic substitution cipher

multiple simple substitution ciphers used.

Signup and view all the flashcards

Transposition cipher

Order of letters are changed

Signup and view all the flashcards

Study Notes

Introduction to Cryptography

  • Cryptography comes from the Greek words "krypto" (secret) and "graphein" (write), thus meaning secret writing
  • Cryptography is the art and science of securing messages
  • Cryptography involves techniques for secure communication, for creating documents that can be shared secretly over public channels
  • Modern cryptography combines mathematics, computer science, and electrical engineering
  • Cryptography applications include ATM cards, computer passwords, and e-commerce

History of Cryptography

  • 50 B.C.: Julius Caesar used cryptographic techniques
  • 400 A.D.: Kama Sutra mentions cryptographic techniques in India
  • 1250: Roger Bacon described simple ciphers
  • 1466: Leon Alberti developed a cipher disk
  • 1861: Union forces used a cipher during the Civil War
  • 1914: Encryption technology was used in World War I by British, French, and German forces
  • 1917: William Friedman started a school for cryptanalysis
  • 1917: Gilbert Vernam (AT&T) invented the polyalphabetic cipher
  • 1919: Germans developed the Enigma machine
  • 1937: Japanese designed the Purple machine for encryption
  • 1942: Navajo windtalkers aided secure communication during World War II
  • 1948: Claude Shannon developed statistical methods for encryption/decryption
  • 1976: IBM developed the Data Encryption Standard (DES)
  • 1976: Diffie-Hellman developed public key / private key cryptography
  • 1977: Rivest, Shamir, and Adleman developed the RSA algorithm for public key / private key cryptography

Plaintext

  • Plaintext is the original message or data in a readable form before encryption
  • Plaintext is sometimes called clear text
  • Plaintext is denoted by M (message) or P (plaintext)
  • Plaintext can be a stream of bits, a text file, a bitmap, or digitized voice

Ciphertext

  • Ciphertext is an encrypted message, represented by C
  • Ciphertext sometimes has the same size as the plaintext, or sometimes larger
  • Ciphertext results from applying an encryption algorithm to the plaintext
  • Ciphertext is unreadable except to intended recipients

Encryption

  • Encryption disguises a message to hide its substance
  • Encryption is the process of scrambling a message using a cryptographic algorithm to make it unreadable by anyone except for intended recipients
  • The encryption function E, when applied to M, generates C in mathematical notation: E(M) = C

Decryption

  • Decryption converts the ciphertext back to the original plaintext
  • The decryption function D, operates on C to produce M, represented as: D(C) = M
  • The decryption process recovers the original plaintext, therefore D(E(M)) = M

Cryptanalysis

  • Cryptanalysis is the art and science of breaking ciphertext
  • Cryptanalysis's practice seeks to see through the disguise
  • Cryptanalysis finds encryption keys to decipher cryptographic algorithms without knowing the encryption
  • A Cryptanalyst is someone breaking cryptographic codes, referred to as "the attacker" or "the intruder”

Cryptology

  • Cryptology is the study of cryptography and cryptanalysis collectively
  • Cryptology encompasses both cryptography and cryptanalysis, and its practitioners are called cryptologists
  • Modern cryptologists are typically trained in theoretical mathematics

Confidentiality Characteristics

  • Authentication: verifying the sender's origin to prevent intruders from masquerading
  • Integrity: ensuring that a message hasn't been altered in transit, preventing substitution of false messages
  • Nonrepudiation: preventing a sender from denying that they sent a message

Authentication

  • Authentication means proving that you are who you claim to be, verifying the creator and sender of a message
  • Digital signatures authenticate the source of messages, ensuring recognition of the message sender
  • Authentication ensures only authorized parties gain access to a message
  • Authentication can be ensured through passwords and digital signatures

Integrity

  • Integrity ensures the message delivered remains intact, unaltered, and trustworthy
  • Digital signatures ensure message integrity
  • Sending a message over a network ensures the arriving data matches what was originally sent without any modification
  • Encryption and hashing algorithms are technical solutions for maintaining message integrity

Non-Repudiation

  • Non-repudiation prevents the sender's denial and ensures message authentication through digital signatures, guaranteeing receipt and identity

Cryptographic Algorithms (Ciphers)

  • A cryptographic algorithm (or cipher) is the mathematical function for encryption and decryption
  • There are typically two related functions: one for encryption and one for decryption
  • An algorithm’s security is based on its secrecy of operation, it is a restricted algorithm.
  • Restricted algorithms are historically interesting but often inadequate

Types of Cryptographic Algorithms

  • Algorithms are classified based on the number of utilized keys
  • Symmetric algorithms (Secret Key Cryptography or SKC) uses a single key for both encryption and decryption
  • Asymmetric algorithms (Public Key Cryptography or PKC) uses one key for encryption and another for decryption
  • Hash Functions involve mathematical transformations to irreversibly encrypt information

Secret Key Cryptography

  • In Secret Key Cryptography (SKC), the same key is used for encryption and decryption, and encryption and decryption keys are sometimes calculated from each other
  • The sender encrypts, sends ciphertext, and the receiver decrypts using the same key
  • Because a single key is used for both encryption and decryption, it is known as symmetrical encryption
  • This form requires key secrecy and distribution
  • Algorithms are called single-key or one-key algorithms and require sender and receiver to agree on a unique key before communication
  • The security of symmetric algorithms relies on the key
  • Symmetric key algorithms in use: DES , Triple DES, AES , Blowfish, CAST, IDEA, and Rivest Ciphers RC2-6
  • Symmetric algorithms categorized as stream and block ciphers
  • Stream ciphers encrypt on single bits or bytes, while block ciphers encrypt groups of bits

Public Key Cryptography

  • Asymmetric Encryption (Public Key Encryption -PKC) was devised in 1975 by Diffie & Hellman based on using a pair of keys - one for encryption called the public key, and the other for decryption called the private key
  • Designed so the encryption key differs from the decryption key, and the decryption key is non-calculatable
  • It's called "public-key cryptography" because the encryption key is public
  • Only the person with the corresponding decryption key can decrypt messages
  • Messages encrypted with the private key are sometimes decrypted with the public key; as with a digital signature
  • Examples include: RSA, DSA, and Diffie-Hellman

Mathematical Base of PKC

  • PKC works through one-way functions that are easy to compute, but hard to reverse
  • The mathematical "trick" is to find a trap door in the one-way function to make reverse calculations easy with specific knowledge

Hash Function

  • Hashing involves transforming a string of characters into a shorter, fixed-length key
  • A Hash function maps digital data of any size to the same data of a fixed size
  • Hash functions return hash values, codes, sums, or simply hashes
  • Hash functions are irreversible

Restricted Algorithm Drawbacks

  • Restricted algorithms work best with small groups of users because time a user leaves the group, they switch to a different algorithm
  • Any accidental secret leaks requires everyone to change algorithms
  • Restricted algorithms are not quality controlled or standardized
  • Every group must design own algorithms which can lead to vulnerabilities

Cryptanalytic Attacks

  • An attempted cryptanalysis is an attack or cryptanalytic attack
  • Loss of a key through non-cryptanalytic means is a compromise
  • Four general types of cryptanalytic attacks assume complete knowledge of the encryption algorithm: ciphertext-only, known-plaintext, chosen-plaintext, adaptive-chosen-plaintext

Ciphertext-Only Attack

  • For this attack, the cryptanalyst only has the ciphertext of several messages encrypted via the same algorithm
  • The cryptanalyst recovers the plaintext of multiple messages, or determines the key (or keys) to decrypt future messages

Known-Plaintext Attack

  • The cryptanalyst possesses the ciphertext and the corresponding plaintext for several messages
  • The goal is to determine the key (or keys) to decrypt new messages
  • A known-plaintext attack is more powerful and easier than a ciphertext-only attack
  • Known-plaintext (and chosen-plaintext) attacks were common practice during World War II

Chosen-Plaintext Attack

  • The cryptanalyst has access to the ciphertext and associated plaintext, and they are able to choose text to encrypt
  • This attack is easier to utilize than a known-plaintext attack because the cryptanalyst chooses and encrypts specific plaintext blocks for more information about the key
  • The job involves deducing keys used to encrypt messages

Adaptive-Chosen-Plaintext Attack

  • Adaptive-chosen-plaintext attack: cryptanalyst chooses plaintext with modifiable choices based on previous encryption results
  • The cryptanalyst chooses a smaller plaintext block with another choice based on results

Other Types of Cryptanalytic Attacks

  • Additional forms of cryptanalytic attacks: Chosen-ciphertext, Chosen-key, Rubber-hose cryptanalysis

Chosen-Ciphertext Attack

  • A cryptanalyst can choose different ciphertexts to decrypt and access the decrypted plaintext
  • This is applicable to public-key algorithms sometimes has effects against a symmetric algorithm also
  • Chosen-plaintext and chosen-ciphertext attacks together are a chosen-text attack

Chosen-Key & Rubber-Hose Attack

  • Chosen-key attack refers to cryptanalysts with knowledge regarding relationships of different keys
  • Rubber-hose cryptanalysis refers to extortion tactics and a purchase-key attack refers to bribing for the key

Complexity of An Attack

  • Attack complexity can be measured in three separate ways
  • Data Complexity refers to the amount of data used to perform the attack
  • Processing or Time Complexity (Work Factor) refers to the time it would take to perform the attack
  • Storage Requirements refers to the memory needed to perform the attack

Kerckhoff's Assumption

  • One should not rely on the secrecy of the algorithm to secure a cryptosystem
  • The math should be secure enough that any algorithm can withstand attacks without it being top secret

Security of Algorithms

  • Algorithms provide varied security based on how difficult breaking them is

  • Protection is possible if the cost of breaking the algorithm is more than the value the encrypted data

  • Protection is possible if the time required to break an algorithm is longer than secret data remains secret

  • Security depends on the amount of data encrypted with one key

  • Since there is always a chance of cryptanalysis, the value of the data should be less than the cost to break the security

  • Protection is achieved if the cost to break the encrypted data is more than value the data is worth.

Unconditionally Secure Algorithms Vs Computationally Secure Algorithms

  • An algorithm is unconditionally secure there is too little information to recover the plaintext, no matter how much ciphertext

  • A one-time pad is unbreakable where other cryptosystems are breakable in a ciphertextonly attack

  • An algorithm is computationally secure if available resources, current and future, cannot break it

Key and Key Space

  • A key controls the operation and behavior of a cryptographic algorithm.
  • Rules used convert a document into something secret.
  • Keyspace is the range of possible Key values
  • Example: E(M)=C , D(C)=M then D(E(M))=M

Cryptosystem

  • A cryptosystem combines algorithms, plaintext, ciphertext, keys, and key management functions for cryptographic operations
  • A cryptosystem is a 5-tuple (E,D,M,K,C) including encryption/decryption functions, plaintexts set, keys set, and ciphertexts set

Substitution Ciphers

  • Substitute or replace each character plaintext with another character
  • Receiver inverts the substitution for the ciphertext
  • Easy to break due to statistical properties of written language.
  • Substitution ciphers come one of four types: simple mono alphabetic, homophonic, polygram, and poly alphabetic

Types of Substitutions Ciphers

  • Simple substitution cipher: also mono alphabetic cipher is one in which original character is replaced with a corresponding character of ciphertext
  • Homophonic substitution: single character replaces other forms character
  • Polygram substitution cipher: encrypts blocks of characters are encrypted in groups.
  • Polyalphabetic substitution cipher: Made up of multiple simple substitution ciphers that uses the position of each character of plaintext to change the cipher

Transposition cipher

  • Changes order of the letters
  • Involves a simple columnar transposition cipher where plaintext is written on graph paper and is read off vertically
  • Easy to break when analyzing structure of language

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser