Science of breaking encrypted messages to recover their meaning
Cryptanalysis
- Converts messages from plaintext to ciphertext
Cipher
Unencrypted message
Plaintext
Converts plaintext to ciphertext
Encryption
Turns ciphertext back into plaintext
Decryption
Nonce
- To encrypt a message, you shift each letter of the alphabet three places to the right
Caesar Cipher
Enigma
- Machine used by Japanese in WWII for cryptosystems
Purple Machine
Out of the CIA triad what does cryptography provide?
Confidentiality and Integrity
The order of the plaintext should be dispersed in the ciphertext
Diffusion
The relationship between the plaintext and ciphertext should be as random as possible
Confusion
Use an encryption algorithm to replaces each character of the plaintext with another character
Cryptographic Substitution
Use an encryption algorithm to rearrange the characters of the plaintext, forming the ciphertext message
Permutation aka Transposition
One-Time Pads
In this cipher, the encryption key is as long as the message itself and is often chose from a common book (i.e. Moby Dick)
Running Key Cipher
Describes how long it will take to break a cryptosystem (decrypt a ciphertext without the key)
Work factor
Uses one alphabet, in which a specific letter substitutes for another
Monoalphabetic cipher
- i.e. Vigenere cipher
Polyalphabetic cipher
Logical functions that returns a true value when only one of the input values is true
Exclusive OR (XOR)
Process of selecting the right method (i.e. cipher) and implementation for the right job, typically organization-side scale.
Cryptographic Protocol Governance
- Use discrete logarithms
Diffie-Hellman
ElGamal
Linux systems use _____ to encrypt passwords and this is based on ______.
bcrypt
Blowfish