plaintext (or cleartext)
unencrypted message
ciphertext
an encrypted message
cipher
process (or algorithm) used to encrypt and decrypt a message
cryptanalysis
art of breaking or “cracking” cryptographic systems
cryptography
- historically, operated using simple substitution or transposition ciphers
security through obscurity
- attempts to hide details of cipher (secret algorithm)
transport encryption
confidentiality means that a message cannot be deciphered without having the appropriate cipher and key (or alternatively the means to crack the cipher)
non-repudiation
- linked to identification and authentication
T or F. Cryptography can be used to design highly resilient control systems
True
control system
system with multiple parts, such as sensors, workstations, and servers, and complex operating logic
obfuscation
white box cryptography
substitution ciper
transposition cipher
rail fence cipher
if you’re having trouble with the transposition cipher, try arranging groups of letters into columns
key
T or F. Most modern ciphers are made stronger by being open to review (cryptanalysis) by third-party researchers
True
keyspace
range of key values available to use with a particular cipher
T or F. Basic substitution and transposition ciphers are vulnerable to cracking by frequency analysis
True
frequency analysis
depends on the fact that some letters and groups of letters appear more frequently in natural language than others
T or F. A secure cipher must exhibit the properties of confusion and diffusion
True
confusion
diffusion
trapdoor functions
basis of mathematical ciphers is to use an operation that is simple to perform one way (when all the values are known) but difficult to reverse