Term
|
Definition
Science of building new encryption/decryption methods. |
|
|
Term
|
Definition
Science of discovering weaknesses in existing encryption/decryption systems so, that the plaintext can be recovered without foreknowledge of the key. |
|
|
Term
|
Definition
Original Message (data) with its info content intact |
|
|
Term
|
Definition
This is the encrypted plaintext |
|
|
Term
|
Definition
Type of encryption that substitutes words or phrases for other words or phrases. According to a specific code book. The code book is the key. |
|
|
Term
|
Definition
Is an encryption method where symbols in the plaintext are replaced by other symbols in the Ciphertext according to some rule. The rule is the key and the key defines the rule. Replacing isn't always substitution. |
|
|
Term
List the five rules to minimally secure information |
|
Definition
- Systematically Communicate
- Hide information content of a message (during transmission)
- Recover the information content at reception
- Process must be fast & easy to use
- Neither the process nor the "message" should reveal original information to an eavesdropper.
|
|
|
Term
What do we need to assume about the eavesdropper. |
|
Definition
Eve is intellegent, motivated and that eve has the same resources as Alice + Bob. |
|
|
Term
Name the six criteria of a good cipher according to Auguste Kerckoff |
|
Definition
- System should be unbreakable in practice if not absolutely unbreakable. (no one can break it in the time it is useful) (long enough and expensive enough that it's not worth doing.)
- Compromise of the system should not inconvenience the correspondents. (if the system is compromised than the correspondents can still use the system)
- The key should be easy to remember.
- The cryptograms( Ciphertext) should be transmittable over telegraph.
- Any apparatus or documents should be portable & operable by one person
- The system should be easy to use neither requiring knowledge of a long list of rules nor involve use of mental strain.
|
|
|
Term
What were Claude Shannon's characteristics of a good cryptosystem. |
|
Definition
Confusion: cipher should hide any local patterns or characteristics of the plaintext language.
Diffusion: Cipher should mix segments so that no character remains in its original position. (transposing) |
|
|
Term
Name the three general attacks of Cryptanalysis |
|
Definition
- Cipher text only attack (everything but the key & most difficult attack)
- Known plaintext - all or part of the original plaintext is known & can be located in ciphertext. (matching plaintext and ciphertext)
- Chosen (seeded) plaintext - get an opponent to encrypt and send a message of which you know the content. Easiest method.
|
|
|
Term
Define the model communication system. |
|
Definition
Alice needs to send a message (plaintext) to bob without eve reading the message. Alice devises a cipher to encrypt the message. Alice shares cipher with bob (via plaintext). Alice encrypts the plaintext and sends results (ciphertext) to bob. Bob receives and decrypts the ciphertext to extract plaintext. |
|
|
Term
|
Definition
Writing hidden in plain sight. |
|
|
Term
|
Definition
Government sponsored organization responsible for cryptography & cryptanalysis for the government. |
|
|