Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
20 views7 pages

6 Note

Cryptography is the mathematical science of securing messages through encryption and decryption, while cryptanalysis focuses on breaking these encrypted messages. Key terms include plaintext, ciphertext, and the role of keys in encryption and decryption processes, with primary goals of cryptosystems being confidentiality, integrity, authentication, and non-repudiation. Historical examples of cryptographic techniques include the Caesar Shift Cipher and the Enigma Machine, and attacks on cryptosystems can be categorized as passive or active, with various methods employed to compromise security.

Uploaded by

hasinierandi505
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views7 pages

6 Note

Cryptography is the mathematical science of securing messages through encryption and decryption, while cryptanalysis focuses on breaking these encrypted messages. Key terms include plaintext, ciphertext, and the role of keys in encryption and decryption processes, with primary goals of cryptosystems being confidentiality, integrity, authentication, and non-repudiation. Historical examples of cryptographic techniques include the Caesar Shift Cipher and the Enigma Machine, and attacks on cryptosystems can be categorized as passive or active, with various methods employed to compromise security.

Uploaded by

hasinierandi505
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1. What is cryptography and how does it relate to cryptology?

Cryptography is the science of using mathematics to encrypt and decrypt


data, essentially the art and science of keeping messages secure. It is one of
the two main branches of cryptology, with the other being cryptanalysis,
which focuses on breaking ciphertext and finding weaknesses in
cryptographic systems. Cryptography is concerned with creating secret
writing to hide the meaning of a message, while cryptanalysis aims to reveal
that hidden meaning or find vulnerabilities in the process used to hide it.

2. Can you explain some key terms used in cryptography?

Several terms are fundamental to understanding cryptography. Plaintext is


the original, unencrypted, readable message. Ciphertext is the result of the
encryption process, appearing as random characters and being unreadable
without decryption. A cipher refers to the specific algorithm or mathematical
function used to transform plaintext into ciphertext during encryption.
Encryption is the process of applying this function to make data unreadable
unless a specific key is used, and decryption is the reverse process, using the
key to turn ciphertext back into plaintext. The key is the crucial element that
controls the encryption and decryption processes.

3. What are the primary goals of using a cryptosystem?

A cryptosystem is used to achieve several key goals of information security.


Confidentiality ensures that information is not accessible to unauthorized
parties. Integrity provides assurance that a message has not been altered
during transmission, either accidentally or intentionally. Authentication
validates the source of a message, confirming that the sender is properly
identified. Finally, Non-Repudiation prevents a sender from denying that they
sent a particular message.

4. What are some historical examples of cryptographic techniques?

Cryptography has a long history, dating back thousands of years. The


earliest known technique is the use of hieroglyphs by the Egyptians around
4000 years ago, which served as a secret code known only to scribes. The
Caesar Shift Cipher, used by Julius Caesar, is a classic example of a
substitution cipher where each letter is shifted by a fixed number of places
(often three). The Vigenère Cipher, developed in the 16th century,
introduced the concept of an encryption key, although it could still be
broken. The One Time Pad is a theoretically unbreakable cipher where the
key is random, the same length as the message, and used only once.
Columnar Transposition rearranges plaintext by columns. A more modern
historical example is the German Enigma Machine used in WWII, a complex
device that provided billions of ways to encode messages.

5. What is Kerckhoffs’s Principle and why is it important?

Kerckhoffs’s Principle states that a cryptosystem should remain secure even


if everything about the system, except the key, is publicly known. This
principle is paramount in modern cryptography because history has shown
that relying on the secrecy of the cipher algorithm itself is risky. Secret
ciphers are often broken once they are reverse-engineered. Therefore, the
security of a cryptosystem should depend solely on the secrecy of the key,
not the secrecy of the algorithm.

6. How are attacks on a cryptosystem typically categorized?

Attacks on cryptosystems are generally categorized as either passive or


active. Passive attacks aim to gain unauthorized access to information
without altering it or disrupting the communication channel. Examples
include intercepting and eavesdropping on communications. Active attacks,
on the other hand, involve changing the information or disrupting the
communication channel. This can include modifying data, initiating
unauthorized transmissions, altering authentication data, deleting data, or
denying access to legitimate users (denial of service).

7. What are some other common types of cryptographic attacks?

Beyond passive and active attacks, there are various methods attackers use
to try and break cryptosystems. A Ciphertext-Only Attack occurs when the
attacker only has access to the ciphertext and tries to find the plaintext and
key. A Known Plaintext Attack happens when the attacker has access to pairs
of plaintext and their corresponding ciphertext to deduce the key. A Chosen
Plaintext Attack involves the attacker selecting specific plaintexts and
obtaining their corresponding ciphertexts to find the key. A Dictionary Attack
involves building a list of ciphertexts and their known plaintexts to
potentially match new ciphertexts. A Brute Force Attack attempts every
possible key until the correct one is found. A Man-In-The-Middle (MITM) attack
intercepts communication between two parties. A Side Channel Attack
exploits weaknesses in the physical implementation of a cryptosystem rather
than the algorithm itself.

8. What is the difference between a passive and an active attack?

The fundamental difference between a passive and an active attack lies in


the attacker's interaction with the data and communication channel. A
passive attack is non-intrusive; the attacker's goal is simply to observe and
gather information without modifying it or disrupting the communication. It's
like eavesdropping. An active attack, conversely, involves the attacker
directly interacting with the data or channel by modifying information,
injecting false data, or disrupting the service. Active attacks aim to alter or
hinder the flow of information, while passive attacks are focused solely on
unauthorized access to information.

Note 

Information Assurance & Security - Cryptography Introduction

Study Guide

Quiz

What is the primary difference between cryptography and cryptanalysis?

Define plaintext and ciphertext.

What is the role of a key in cryptography?

List four goals of a cryptosystem.

Briefly describe the Caesar Shift Cipher.


What key concept did the Vigenère Cipher introduce compared to the Caesar
cipher?

What makes the One Time Pad cipher unique and theoretically unbreakable?

Explain the core idea behind Kerckhoffs’s Principle.

What is the main difference between a passive attack and an active attack
on a cryptosystem?

Briefly describe a Brute Force Attack.

Quiz Answer Key

Cryptography is the science of secret writing focused on hiding message


meaning, while cryptanalysis is the art and science of breaking ciphertext
and studying systems for weaknesses.

Plaintext is the original, unencrypted, readable message. Ciphertext is the


result of the encryption process, appearing as random characters.

A key acts like a lock and key for the encryption and decryption algorithms,
allowing them to function and transform data.

Four goals of a cryptosystem are Confidentiality, Integrity, Authentication,


and Non-Repudiation.

The Caesar Shift Cipher is a substitution cipher where each character of the
plaintext is shifted by a fixed number of positions (commonly three) to form
the ciphertext.

The Vigenère Cipher introduced the idea of using an encryption key, making
the secrecy of the message dependent on the key rather than the system
itself.

The One Time Pad is unbreakable because the key is the same length as the
message, made of random symbols, and is used only once.

Kerckhoffs’s Principle states that a cryptosystem should remain secure even


if everything about it except the key is publicly known.

A passive attack aims to obtain information without altering it or disrupting


communication (e.g., eavesdropping), while an active attack involves
modifying or disrupting information or communication (e.g., unauthorized
modification).
A Brute Force Attack attempts to find the decryption key by trying every
possible key combination until the correct one is found.

Essay Questions

Discuss the evolution of cryptography from ancient techniques like


hieroglyphs and the Caesar cipher to more complex historical methods such
as the Vigenère cipher and the One Time Pad. Highlight the key
advancements and their significance.

Explain the importance of the four goals of a cryptosystem (Confidentiality,


Integrity, Authentication, and Non-Repudiation) in ensuring information
security. Provide examples of how a successful cryptosystem achieves each
goal.

Compare and contrast the different types of attacks on a cryptosystem


discussed in the source material (e.g., Passive vs. Active, Known Plaintext vs.
Ciphertext Only). Analyze the methodologies and relative difficulty of each
attack type.

Explain Kerckhoffs’s Principle and its relevance in the context of modern


cryptography. Discuss why keeping cipher details secret is generally not
considered a reliable security measure compared to key secrecy.

Describe the German Enigma Machine and its historical significance during
WWII. Explain why it was initially considered unbreakable and how its
weaknesses were eventually exploited.

Glossary of Key Terms

Cryptography: The science of using mathematics to encrypt and decrypt


data; the art and science of keeping messages secure.

Cryptology: The study of codes, encompassing both cryptography and


cryptanalysis.

Cryptanalysis: The art and science of breaking ciphertext and studying


cryptographic systems to look for weaknesses.

Plaintext: An unencrypted, readable, plain message.

Ciphertext: The result of the encryption process; encrypted plaintext that


appears as random characters.
Cipher: The encryption algorithm that transforms plaintext into ciphertext.

Encryption: The process of applying a mathematical function to a file to


make its contents unreadable without the correct key.

Decryption: The reverse process of turning ciphertext back into plaintext.

Key: A secret piece of information used to lock and unlock an algorithm,


enabling the encryption or decryption process.

Confidentiality: The goal of ensuring that unauthorized parties cannot access


information.

Integrity: The assurance that a message has not been modified during
transmission.

Authentication: The process of validating the source of a message to ensure


the sender is properly identified.

Non-Repudiation: The ability to prevent a sender from denying that they sent
a message.

Hieroglyph: An ancient form of writing, used here as an example of an early


cryptographic technique.

Substitution Cipher: A cipher where each character of the plaintext is


substituted by another character to form the ciphertext.

Caesar Shift Cipher: A substitution cipher where letters are shifted a fixed
number of places down the alphabet.

Vigenère Cipher: A polyalphabetic substitution cipher that uses an encryption


key.

One Time Pad: An unbreakable cipher where the key is random, the same
length as the message, and used only once.

Columnar Transposition: A method that rearranges plaintext by columns or


rows.

Enigma Machine: A famous encryption machine used by the Germans during


WWII.

Kerckhoffs’s Principle: The principle that a cryptosystem should be secure


even if everything about the system except the key is public knowledge.

Passive Attack: An attack that obtains unauthorized access to information


without altering it or disrupting the communication channel.
Active Attack: An attack that involves changing information or disrupting the
communication channel in some way.

Ciphertext Only Attack: An attack where the attacker only knows the
ciphertext and tries to find the key and plaintext.

Known Plaintext Attack: An attack where the attacker is aware of pairs of


plaintext and their corresponding ciphertext.

Chosen-Plaintext Analysis: An attack conducted by choosing random


plaintexts and obtaining their corresponding ciphertexts.

Dictionary Attack: An attack that involves compiling a list of known plaintext-


ciphertext pairs (a "dictionary") to find corresponding plaintext for new
ciphertext.

Man-In-The-Middle (MITM) Attack: An attack that intercepts messages


between two communicating parties.

Brute Force Attack (BFA): An attack that tries every possible key to decrypt
ciphertext.

Side Channel Attack (SCA): An attack that exploits weaknesses in the


physical implementation of a cryptosystem rather than the algorithm itself.

You might also like