Skip to content

Pelcgbytbtl(Cryptography)

Cryptography

  • Encryption
    The act of taking a message, called plaintext, and applting an opeation to it, called a cipher, so that you receive a garbled, unreadable message as the output, called ciphertext.

  • Decryption

  • Holly Wyrld

  • key

  • Encryption algorithm
    The underlying logic of process that’s used to convert the plaintext into ciphertext

  • Security through obscurity

  • Kerchoff’s principle

  • Cryptosystem
    A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptography service should remain secure - even if everything about the system is known, except the key

  • Shannon’s maxim
    The system should remain secure even if your adversary knows exactly what kind of encryption systems you’re employing, as long as your keys remain secure.

  • Cryptology

  • Cryptoanalysis

  • Frequency analysis
    The practice of stuying the frequency with letters appear in a ciphertext

  • e t a o

  • th er on an

  • Stenography
    The practice of hiding information from observers, but not encoding it

Symmetric Cryptography

  • Symmetric-key algorithm

  • Substition cipher
    An encryption mechanism that replaces parts of your plaintext with ciphertext

  • Caesar Cipher

  • Stream cipher
    Takes a stream of input and encrypts the stream one character or one digits at a time, outputting one encrypted character or digit at a time.

  • Block ciphers
    The picker takes data in, places it into a bucket or block of data that’s fixed size, then encodes that entire block as one unit.

  • Initialization vector

Symmetric Encryption Algorithms

  • SData Encryption Standard

  • FIPS
    Federal Information Processing standard

  • Key length

  • Brute-force attack

  • 2

    56

  • National Institute of standards & technology

  • Advanced Encryption Standard

  • Because of large key size, brute-force attacks on AES are only theoritical right now, because the computing power required(or time required using moderm technology) exceeds anything feasible today.

  • An important thing to keep in mind when considering various encrytpion algorithms is speed and ease of implementation.

  • RC4 (Rivest Cipher 4)
    A symmtric stram cipher that gained widespread adoption because of its simplicity and speed

  • TLS 1.2 with AES GCM

Asymmetric Cryptography

  • Asymmetric or public key ciphers

  • Public key signatures

  • Confidetiality

  • Authenticity

  • Non-repudiation

  • Message Authentication Codes(MACs)

  • MAC
    A bit of information that allows authentication of a received message, ensuring that he message came from the alleged sender and not a third party

  • HMAC
    Key-hash message authentication code

  • CMACs Cipher-Based Message Authentication Codes

  • CBC-MAC
    Cipher block chaining messge authentication codes

Asymmetic Encryption Algorithms (RSA)

  • Digital Signature Algorithm

  • Diffie-Hellman

  • Elliptic curve crytography(ECC)
    A public-key encryption system that uses the algrebic structures of elliptic curves over finite fields to generfate secure keys

  • Both Diffie-Hellmen and DSA have elliptic curve variants, referred to as ECDH and ECDSA, respectively.