week three!. 8 groups of 2 6 rounds ancient cryptosystems newer cryptosystems modern...

14
CRYPTOGRAPHY TRIVIA Week three!

Upload: darby-haseley

Post on 15-Dec-2015

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

CRYPTOGRAPHY TRIVIAWeek three!

Page 2: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

The Game 8 groups of 2 6 rounds

Ancient cryptosystems Newer cryptosystems Modern cryptosystems Encryption and decryptions Math Security and Performance

10 questions per round Each question is worth 1 point Bonus Bingo: Fill in 25 things from this

class that you think are important. Mark them off if or when they come up.

Page 3: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Ancient cryptosystems1. This cryptosystem has the encryption function

.2. This cryptosystem has the encryption function

.3. Name two ancient cryptosystems that are

resistant to frequency analysis.4. What is the term used to designate that a

cryptosystem encrypts several characters simultaneously?

5. What is the term used to designate that a key changes throughout the message encrypted?

Page 4: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Ancient cryptosystems6. This cryptosystem has the encryption function

, but changes the key based on the previous plaintext.

7. This cryptosystem is unbreakable.8. In the above cryptosystem over , how many

possible keys are there for a 1024-bit message.

9. This cryptosystem requires exactly 7 known plaintext-ciphertext pairs to break.

10. This cryptosystem’s encryption function cannot be described by a “nice” mathematical equation.

Page 5: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Newer cryptosystems1. This was the primary cryptosystem used by

the Germans during World War II.2. What was an advantage of the above

cryptosystem?3. What was a disadvantage of the above

cryptosystem?4. This was a cryptosystem used by the

Americans during World War II that was never broken.

5. What was an advantage of the above cryptosystem?

6. What was a disadvantage of the above cryptosystem?

Page 6: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Newer cryptosystems7. What cryptosystem was the first major

cryptosystem to place its security just in the key?

8. This was the first algorithm released to the public that could enable Alice and Bob to establish cryptographic communication?

9. What algorithm relies on factoring for security?

10. What algorithm relies on the discrete logarithm problem for security?

Page 7: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Modern cryptosystems1. This can replace RSA today.2. This might some day RSA in the future.3. This handles the vast majority of

cryptography today.4. In a war, if one side chooses to encrypt their

information with AES, what should the other side choose?

5. In Quantum teleportation, what is “teleported”?

Page 8: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Modern cryptosystems6. Name all public-key systems we have

covered.7. In Quantum computing, this describes the

ability for a qubit to become 1 and 0 at the same time.

8. In Quantum computing, if two entangled qubits both have the value 0.5, what will they be when you observe them?

9. Will quantum computers make classical computers obsolete?

10. A 512 qubit quantum computer exists … why can’t it break 128-bit ECC?

Page 9: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Math1. Find in 2. Find in 3. Find 4. Find mod 5. Find mod 6. Find in .7. Find in .8. Solve in .9. Solve and in simultaneously. 10. Which is a faster growth rate? or ?

Page 10: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Encryption!1. Encrypt 7 using a rotation cipher over with

key .2. Encrypt 18 over using an affine cipher with

key .3. Encrypt 3 using RSA with and .4. Encrypt using an autokey cipher with starting

key over .5. XOR the string with .

Page 11: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Decryption!6. Decrypt , which was encrypted with a vigenere cipher

using the key over . 7. Decrypt which is the output of the accompanying S-

box.8. Decrypt , which was encrypted with a one-time-pad

using the key over .9. Decrypt , which was encrypted using the substitution

cipher 10. Solve the discrete log problem mod 100.

S 0 1 2 3

0 11

12

13

14

1 15

16

17

18

2 19

20

21

22

Page 12: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Security and performance

Key size

Keyspace

Encryption runtime

Decryption runtime

pairs needed

Resistant to Frequency Analysis?

Substitution over

Rotation over

Autokey over

One-time-pad over

Affine over

Vigenere over

Hill over

point for the first 9 correct point for the next 20 correct

1 point for each correct answer beyond 29

(Rotation does not count)(Assume you only ever store the encryption key and never modify it for quick decryption)

Page 13: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

CRYPTOGRAPHY TRIVIAThe End

Page 14: Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security

Reference Information Created in the summer of 2013 by Dr.

Jeffrey Beyerl for use in a cryptography class.

This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.