Crypto U1, Basic Principles

Beschreibung

IYM002 (Unit 1 - basics) Mindmap am Crypto U1, Basic Principles, erstellt von jjanesko am 31/03/2013.
jjanesko
Mindmap von jjanesko, aktualisiert more than 1 year ago
jjanesko
Erstellt von jjanesko vor mehr als 11 Jahre
135
12

Zusammenfassung der Ressource

Crypto U1, Basic Principles
  1. Vocabulary: Quizlet flashcards, password: imy002 URL: http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/

    Anmerkungen:

    • Quizlet flashcards (http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/) (tutor reviewed and approved) Password:  imy002 Vocabulary is used throughout the entire course.  This provides the formal definitions set in the first chapter.
    1. 3 issues to consider when contemplating use of cryptography
      1. cost
        1. monetary
          1. ease of use
            1. efficiency of operation
            2. strength
              1. appropriateness of use
              2. 3 different ways to maintain confidentiality of data
                1. encryption
                  1. steganography
                    1. access control
                    2. attacks
                      1. 3 standard assumptions about attackers ability
                        1. has access to all ciphertexts
                          1. has some corresponding plaintext and ciphertext pairs
                            1. knows encryption algorithm
                            2. 2 types of crypto algorithm "breaks"
                              1. method to find key
                                1. for example: exhaustive key search
                                  1. also known as a brute force attack
                                  2. for example: use statistical properties of plaintext language to help reverse engineer key
                                  3. weakness is found in algorithm and makes key unnecessary
                                  4. How an attacker knows when he/she has found the correct key
                                    1. apply key to known plaintext/ciphertext pairs
                                      1. Has knowledge of plaintext language.
                                        1. may have contextual information that gives a clue
                                        2. kinds of attacks
                                          1. exploiting short key length
                                            1. dictionary attacks
                                              1. exploiting key derivation process
                                                1. time memory tradeoff attacks
                                                  1. cryptographic primitive-specific attacs
                                                    1. birthday attacks
                                                      1. statistical attacks
                                                        1. differential and linear cryptanalysis
                                                        2. algorithm specific attacks
                                                          1. side channel attacks
                                                            1. timing attack
                                                              1. power analysis
                                                                1. fault analysis
                                                                  1. padding attacks
                                                                  2. academic
                                                                Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                ähnlicher Inhalt

                                                                Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                jjanesko
                                                                Crypto U3, Theoretical vs. Practical Security
                                                                jjanesko
                                                                Crypto U4, Stream Cipher
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Counter Mode
                                                                jjanesko
                                                                Crypto U2, Crypto design principles
                                                                jjanesko
                                                                Crypto U8, example dynamic password scheme
                                                                jjanesko
                                                                Crypto U10 (part 1), Key Management & Lifecycle
                                                                jjanesko
                                                                Crypto U10 (part 2), Key Management and Lifecycle
                                                                jjanesko
                                                                Crypto U12 (part 1), crypto for mobile telecom
                                                                jjanesko