-
computer security (or cybersecurity)
-
Information security (or infosec)
- CIA triad
- confidentiality
- integrity
- availability
- authentication
- non-repudiation
- CIA triad
-
cyberattack
-
spoofing attack (threat to confidentiality)
-
eavesdropping (threat to confidentiality)
-
denial-of-service attack (DoS attack) (threat to availability)
- SYN flood
- SYN cookie
- distributed denial-of-service attack (DDoS attack)
- SYN flood
-
man-in-the-middle (MITM) attack (threat to both confidentiality and integrity)
-
session hijacking (or cookie hijacking)
-
-
cryptanalysis
- brute-force attack (or exhaustive key search)
-
cipher (or cypher) (צופן)
-
key (מפתח הצפנה)
-
encryption (הצפנה)
-
decryption (פענוח)
-
plaintext (טקסט גלוי)
-
ciphertext (טקסט מוצפן)
-
symmetric-key (or symmetric) cryptography
- shared key (or secret key)
-
public-key (or asymmetric) cryptography
- public key
- private key
-
Diffie–Hellman (DH) key exchange
- Alice and Bob publicly agree on a prime and a base (which is a primitive root modulo )
- Alice’s private key:
- Bob’s private key:
- Alice’s public key:
- Bob’s public key:
- Secret shared key:
-
A cryptographic hash function (CHF) is a hash function that satisfies the following properties:
- (pre-image resistance) for a given hash value , it is computationally infeasible to find any input such that
- (second pre-image resistance) for a given input , it is computationally infeasible to find another input such that and
- (collision resistance) it is computationally infeasible to find any two distinct inputs and such that
-
The output of a CHF is called the message digest (or hash value) of the input message.
-
digital signature
- using message digest (MD)
- given:
- both sender and receiver know the CHF
- the sender has a public-private key pair: for encryption/decryption functions and (such that for any message )
- sender:
- (plaintext)
- (message digest)
- (signature)
- (sends to receiver)
- receiver:
- computes
- computes
- verifies that
- given:
- using message digest (MD)
-
substitution cipher
-
Caesar cipher (or shift cipher)
-
one-time pad (OTP)
-
block cipher
- plaintext of size bits (block size)
- key of size (key size)
- key space:
- ciphertext of size bits
- encryption function:
- decryption function:
-
-
block cipher mode of operation
- electronic codebook (ECB)
- cipher block chaining (CBC)
- initialization vector (IV)
- counter mode (CTR)
-
Kerckhoffs’s principle
- Shannon’s maxim: The enemy knows the system
-
known-plaintext attack (KPA) (התקפת גלוי-ידוע)
-
ciphertext-only attack (COA) (or known ciphertext attack)
-
chosen-plaintext attack (CPA) (התקפת גלוי-נבחר)