Crypto 101
Last updated
Was this helpful?
Last updated
Was this helpful?
symetric: both sender and rec have the same key. Then you encrypt and decrypt with one key. - des - aes - rc4 - blowfish asymetric/public key: public key can encrypt but cannot decrypt then the private key can decrypt. Each user has their own private and send the corresponding public keys to the other users. Data handling refers to how much data we encrypt and send at a time. Block: we do it in chunks (8bytes, 16,32, etc) - des - aes stream: we do it byte by byte - rc4 - a5/1 ECB block: Electronic code block cipher easer to reverse since identical text blocks will end up being the same cipher blocks and can be guessed. CBC block: cipher-block chaining harder to guess at since it also uses the last block to help encrypt the current block and the first block is an initializer block.
Crypto attack categories:
common attacks:
Brute force: You know a plain text and cypher text combo and you then guess the key until you get the expected output from the input. This method is limited only by the power of computers. The current CUDA core computing has made DES (56 bit keys) insecure as a modern gpu can easily bruteforce this encryption. Dictionary attack: This works for symmetric key encryption where the user selects keys. This save time with guessing more nonmonic names rather than aaa aab aac style brute forcing. This attack tends to work because of the human factor. a 4 letter key is more likly to be a word than random letters. Rainbow tables: Because disk space has gotten affordable and cpu speed is still not super great, this method has become popular to utilize the disk more. //need to look up how these work side channel and surrounding attacks: Things to look for that may render the encryption implementation broken: -not destroying plaintext after use -not handling the decryption and resulting plaintext securely -temporary or backup files that store any of the process as a data loss system -key leaks -allowing recovery of old keys -weak passwords -trust relationships