# Crypto U1, Basic Principles

### Description

IYM002 (Unit 1 - basics) Mind Map on Crypto U1, Basic Principles, created by jjanesko on 31/03/2013.
Mind Map by jjanesko, updated more than 1 year ago
 Created by jjanesko over 11 years ago
132
12

## Resource summary

Crypto U1, Basic Principles
1. Vocabulary: Quizlet flashcards, password: imy002 URL: http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/

Annotations:

• Quizlet flashcards (http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/) (tutor reviewed and approved) Password:  imy002 Vocabulary is used throughout the entire course.  This provides the formal definitions set in the first chapter.
1. 3 issues to consider when contemplating use of cryptography
1. cost
1. monetary
1. ease of use
1. efficiency of operation
2. strength
1. appropriateness of use
2. 3 different ways to maintain confidentiality of data
1. encryption
1. steganography
1. access control
2. attacks
1. 3 standard assumptions about attackers ability
1. has access to all ciphertexts
1. has some corresponding plaintext and ciphertext pairs
1. knows encryption algorithm
2. 2 types of crypto algorithm "breaks"
1. method to find key
1. for example: exhaustive key search
1. also known as a brute force attack
2. for example: use statistical properties of plaintext language to help reverse engineer key
3. weakness is found in algorithm and makes key unnecessary
4. How an attacker knows when he/she has found the correct key
1. apply key to known plaintext/ciphertext pairs
1. Has knowledge of plaintext language.
1. may have contextual information that gives a clue
2. kinds of attacks
1. exploiting short key length
1. dictionary attacks
1. exploiting key derivation process
1. time memory tradeoff attacks
1. cryptographic primitive-specific attacs
1. birthday attacks
1. statistical attacks
1. differential and linear cryptanalysis
2. algorithm specific attacks
1. side channel attacks
1. timing attack
1. power analysis
1. fault analysis
1. padding attacks
2. academic

### Similar

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
Crypto U3, Theoretical vs. Practical Security
Crypto U4, Stream Cipher
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
Crypto U4, Block Cipher, Counter Mode
Crypto U2, Crypto design principles
Crypto U8, example dynamic password scheme
Crypto U10 (part 1), Key Management & Lifecycle
Crypto U10 (part 2), Key Management and Lifecycle
Crypto U12 (part 1), crypto for mobile telecom