Crypto U1, Basic Principles

Mind Map by , created over 6 years ago

IYM002 (Unit 1 - basics) Mind Map on Crypto U1, Basic Principles, created by jjanesko on 03/31/2013.

Created by jjanesko over 6 years ago
Crypto U4, Block Cipher, Counter Mode
Crypto U2, Crypto design principles
Crypto U8, example dynamic password scheme
Art & Design in Context
Chloe Scott
Music symbols
Sarah Egan
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
Crypto U3, Theoretical vs. Practical Security
Crypto U4, Stream Cipher
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
Crypto U1, Basic Principles
1 Vocabulary: Quizlet flashcards, password: imy002 URL:


  • Quizlet flashcards ( (tutor reviewed and approved) Password:  imy002 Vocabulary is used throughout the entire course.  This provides the formal definitions set in the first chapter.
2 3 issues to consider when contemplating use of cryptography
2.1 cost
2.1.1 monetary
2.1.2 ease of use
2.1.3 efficiency of operation
2.2 strength
2.3 appropriateness of use
3 3 different ways to maintain confidentiality of data
3.1 encryption
3.2 steganography
3.3 access control
4 attacks
4.1 3 standard assumptions about attackers ability
4.1.1 has access to all ciphertexts
4.1.2 has some corresponding plaintext and ciphertext pairs
4.1.3 knows encryption algorithm
4.2 2 types of crypto algorithm "breaks"
4.2.1 method to find key for example: exhaustive key search also known as a brute force attack for example: use statistical properties of plaintext language to help reverse engineer key
4.2.2 weakness is found in algorithm and makes key unnecessary
4.3 How an attacker knows when he/she has found the correct key
4.3.1 apply key to known plaintext/ciphertext pairs
4.3.2 Has knowledge of plaintext language.
4.3.3 may have contextual information that gives a clue
4.4 kinds of attacks
4.4.1 exploiting short key length
4.4.2 dictionary attacks
4.4.3 exploiting key derivation process
4.4.4 time memory tradeoff attacks
4.4.5 cryptographic primitive-specific attacs birthday attacks statistical attacks differential and linear cryptanalysis
4.4.6 algorithm specific attacks
4.4.7 side channel attacks timing attack power analysis fault analysis padding attacks
4.4.8 academic

Media attachments