Crypto U1, Basic Principles

Description

IYM002 (Unit 1 - basics) Mind Map on Crypto U1, Basic Principles, created by jjanesko on 31/03/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko about 11 years ago
130
12

Resource summary

Crypto U1, Basic Principles
  1. Vocabulary: Quizlet flashcards, password: imy002 URL: http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/

    Annotations:

    • Quizlet flashcards (http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/) (tutor reviewed and approved) Password:  imy002 Vocabulary is used throughout the entire course.  This provides the formal definitions set in the first chapter.
    1. 3 issues to consider when contemplating use of cryptography
      1. cost
        1. monetary
          1. ease of use
            1. efficiency of operation
            2. strength
              1. appropriateness of use
              2. 3 different ways to maintain confidentiality of data
                1. encryption
                  1. steganography
                    1. access control
                    2. attacks
                      1. 3 standard assumptions about attackers ability
                        1. has access to all ciphertexts
                          1. has some corresponding plaintext and ciphertext pairs
                            1. knows encryption algorithm
                            2. 2 types of crypto algorithm "breaks"
                              1. method to find key
                                1. for example: exhaustive key search
                                  1. also known as a brute force attack
                                  2. for example: use statistical properties of plaintext language to help reverse engineer key
                                  3. weakness is found in algorithm and makes key unnecessary
                                  4. How an attacker knows when he/she has found the correct key
                                    1. apply key to known plaintext/ciphertext pairs
                                      1. Has knowledge of plaintext language.
                                        1. may have contextual information that gives a clue
                                        2. kinds of attacks
                                          1. exploiting short key length
                                            1. dictionary attacks
                                              1. exploiting key derivation process
                                                1. time memory tradeoff attacks
                                                  1. cryptographic primitive-specific attacs
                                                    1. birthday attacks
                                                      1. statistical attacks
                                                        1. differential and linear cryptanalysis
                                                        2. algorithm specific attacks
                                                          1. side channel attacks
                                                            1. timing attack
                                                              1. power analysis
                                                                1. fault analysis
                                                                  1. padding attacks
                                                                  2. academic
                                                                Show full summary Hide full summary

                                                                Similar

                                                                Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                jjanesko
                                                                Crypto U3, Theoretical vs. Practical Security
                                                                jjanesko
                                                                Crypto U4, Stream Cipher
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Counter Mode
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                jjanesko
                                                                Crypto U2, Crypto design principles
                                                                jjanesko
                                                                Crypto U10 (part 2), Key Management and Lifecycle
                                                                jjanesko
                                                                Crypto U9, Cryptographic Protocols
                                                                jjanesko
                                                                Crypto U10 (part 1), Key Management & Lifecycle
                                                                jjanesko
                                                                Crypto U8, example dynamic password scheme
                                                                jjanesko