Cryptography

Plain Text

ciphertext - format of data after it's encrypted

RPT-13 - rotation cipher - A common rotation cipher is Rot-13, frequently used to conceal information on bulletin board systems such as Usenet

Vigenere Table - Multi-alphabet - Alphabet is repeated 26 times to form a matrix, called the VigenèreSquare

Symmetric vs Asymmetric

Symmetric - very fast - same key for encryption and decrypt - often referred to as shared key - Key Management is biggest concern

Asymmetric - uses two key system - Key pair - public and private keys

Hashing - Mathematical algorithm applied to a file before and after transmission - if anything changes during transmission the hash will change

MD5, SHA1, SHA2

ECC Elliptic Curve Cryptopgraphy - Asymmetric encryption uses algebraic structure of elliptic curves - Strong encryption using smaller key size

Strong vs weak ciphers - strong ciphers can become weaker as computer power increases - current strong ciphers: AES, 3DES, TwoFish - Weak ciphers - deprecated: WEP, WPA

Digital Signature - Asymmetric encryption using public key/ private key (PKI)

Entropy - randomness collected by system Confusion - each character of ciphertext depends on several parts of the key Diffusion - dissipating the statistical structure of the plaintext

Block v. Stream - both are symmetric Block cipher - encrypts in chunks (blocks) of date Stream cipher - encrypts one bit at a time