9. Applied Cryptography Flashcards

(70 cards)

1
Q

What are classic cryptosystems studied in applied cryptography?

A

Substitution, transposition, codebooks, and one-time pad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a simple substitution cipher?

A

A cipher that replaces each plaintext letter with another letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Caesar cipher?

A

A substitution cipher using a fixed shift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many keys does a Caesar cipher have?

A

26 possible keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is Caesar cipher insecure?

A

Small keyspace allows brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is brute force attack?

A

Trying all possible keys until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is exhaustive key search?

A

Systematically testing every possible key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is keyspace?

A

The set of all possible keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why must keyspace be large?

A

To make brute force infeasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is large keyspace sufficient for security?

A

No, ciphers can still be broken by clever attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is frequency analysis?

A

Using letter frequency statistics to break ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are substitution ciphers vulnerable?

A

They preserve letter frequency patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is language redundancy?

A

Natural languages contain predictable patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does redundancy help attackers?

A

It enables statistical cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a monoalphabetic cipher?

A

Uses one substitution alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a polyalphabetic cipher?

A

Uses multiple substitution alphabets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Vigenère cipher?

A

A polyalphabetic substitution cipher using a repeating key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the period in Vigenère?

A

The length of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is Vigenère more secure than Caesar?

A

It obscures letter frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is Vigenère unbreakable?

A

No, it can be broken using statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Kasiski test?

A

A method to find Vigenère key length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does Kasiski test work?

A

Finds repeated sequences and computes distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Index of Coincidence?

A

Probability two random letters are the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How is IC used?

A

To estimate key length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How is Vigenère broken after finding key length?
By treating it as multiple Caesar ciphers.
26
What is unconditional security?
Security even with unlimited computing power.
27
What cipher is unconditionally secure?
One-time pad.
28
What is computational security?
Security against feasible computation.
29
Give examples of computationally secure systems.
AES, DES, RSA.
30
What is a secure cryptosystem (definition)?
No shortcut attack better than brute force.
31
What is a shortcut attack?
An attack faster than exhaustive search.
32
What are Shannon’s conditions for classical cipher security?
Key length ≥ message length and key used once.
33
What is Kerckhoffs’ principle?
Algorithm is public, key is secret.
34
What is ciphertext-only attack?
Attacker knows only ciphertext.
35
What is known-plaintext attack?
Attacker knows some plaintext-ciphertext pairs.
36
What is chosen-plaintext attack?
Attacker chooses plaintexts to encrypt.
37
What is adaptive chosen-plaintext attack?
Next plaintext depends on previous output.
38
What is chosen-ciphertext attack?
Attacker decrypts chosen ciphertexts.
39
What is forward search attack?
Encrypting guessed plaintexts in public key systems.
40
What is a transposition cipher?
A cipher that rearranges letters.
41
Does transposition change letters?
No, it only rearranges them.
42
What is the rail fence cipher?
A simple transposition cipher.
43
Why are transposition ciphers detectable?
They preserve letter frequencies.
44
What is anagramming?
Rearranging ciphertext to recover plaintext.
45
What is double transposition cipher?
Two consecutive transpositions.
46
Why is double transposition stronger?
It spreads plaintext structure.
47
What modern concept resembles double transposition?
Diffusion in block ciphers.
48
What is a codebook cipher?
A cipher mapping words to codewords.
49
Why are codebooks complex substitutions?
They substitute whole words or phrases.
50
What historical example used codebooks?
Zimmermann telegram.
51
What is the one-time pad (OTP)?
A cipher using random key as long as message.
52
How does OTP encryption work?
XOR plaintext with key.
53
Why is OTP provably secure?
Ciphertext gives no info about plaintext.
54
What are OTP requirements?
Random key, same length, used once, secret.
55
Why is OTP impractical?
Key distribution and length.
56
What is depth in OTP?
Reusing the same key.
57
Why is key reuse dangerous in OTP?
XOR cancels key and reveals patterns.
58
What happens when two OTP messages use same key?
C1⊕C2 = P1⊕P2.
59
Why does OTP in depth break security?
It leaks information.
60
What was the VENONA project?
Breaking reused Soviet one-time pads.
61
Why was VENONA successful?
Keys were reused.
62
What is information-theoretic security?
Another name for unconditional security.
63
What does 'secure until broken' mean?
Security is based on no known attacks.
64
Why must cryptosystems be publicly analyzed?
To detect design flaws.
65
Why is redundancy bad for security?
It leaks structure.
66
What is diffusion in cryptography?
Spreading plaintext statistics.
67
What is the main lesson from classical ciphers?
Design must resist statistical attacks.
68
What is the role of statistics in cryptanalysis?
Reveal hidden patterns.
69
Why are modern ciphers complex?
To resist known attacks.
70
What is the main security lesson from substitution ciphers?
Large keyspace alone is insufficient.