What is the law regarding passwords?
There’s now a law which makes it an offence to not reveal your password when a law enforcer asks you to.
What is a cryptosystem?
Disguises
Disguises messages, allowing only selected people to see through the disguise.
What is cyphertext?
Jumbled
Where all the information is jumbled up so it can be interpreted
What are the two basic methods for disguising messages?
What is transposition?
Letters rearranged into a different order
What is substitution?
Letters replaced by other letters or symbols
What is the method for simple transposition encryption?
What is the method for simple transposition decryption?
What is simple substitution encryption also known as?
Caesar cypher
What is the method for simple substitution encryption?
rewatch lecture?
What is the problem with the shift cypher?
The number of keys is too small (26)
What is an alternative approach to the shift cypher?
Permutation
Use a random key permutation for each letter in the alphabet
What is symmetric key cryptography?
Same key used to encrypt and decrypt the message.
What is symmetric key cryptography?
Same key used to encrypt and decrypt the message.
What is asymmetric key cryptography?
What is a hash?
Transformation of data
A hash is a transformation of data into a distilled form (message digest) that is unique to the data – the process is not reversible (one-way-hash).
What is a cryptographic hash used for?
Integrity
A (cryptographic) hash is used to verify the integrity of data – check if it has been altered in any way.
What is hashing used for?
Integrity
What is a PPK?
Public-private key
What is the procedure for digital signing?
Intended recipient, message digest, senders public key
How does the recipient confirm the message is authentic?
Senders public key, digest
What does a digital certificate do?
Public key
Verifies that a public key belongs to the owner of the certificate.
What is the encryption method for the vigenere cypher?
What is the decryption method for the vigenere cypher?