• computer security (or cybersecurity)

  • Information security (or infosec)

    • CIA triad
      • confidentiality
      • integrity
      • availability
    • authentication
    • non-repudiation
  • cyberattack

    • spoofing attack (threat to confidentiality)

    • eavesdropping (threat to confidentiality)

    • denial-of-service attack (DoS attack) (threat to availability)

      • SYN flood
        • SYN cookie
      • distributed denial-of-service attack (DDoS attack)
    • man-in-the-middle (MITM) attack (threat to both confidentiality and integrity)

    • session hijacking (or cookie hijacking)

  • cryptanalysis

    • brute-force attack (or exhaustive key search)
  • cipher (or cypher) (צופן)

  • key (מפתח הצפנה)

  • encryption (הצפנה)

  • decryption (פענוח)

  • plaintext (טקסט גלוי)

  • ciphertext (טקסט מוצפן)

  • symmetric-key (or symmetric) cryptography

    • shared key (or secret key)
  • public-key (or asymmetric) cryptography

    • public key
    • private key
  • Diffie–Hellman (DHkey exchange

    • Alice and Bob publicly agree on a prime and a base (which is a primitive root modulo )
    • Alice’s private key:
    • Bob’s private key:
    • Alice’s public key:
    • Bob’s public key:
    • Secret shared key:
  • A cryptographic hash function (CHF) is a hash function that satisfies the following properties:

    • (pre-image resistance) for a given hash value , it is computationally infeasible to find any input such that
    • (second pre-image resistance) for a given input , it is computationally infeasible to find another input such that and
    • (collision resistance) it is computationally infeasible to find any two distinct inputs and such that
  • The output of a CHF is called the message digest (or hash value) of the input message.

  • digital signature

    • using message digest (MD)
      • given:
        • both sender and receiver know the CHF
        • the sender has a public-private key pair: for encryption/decryption functions and (such that for any message )
      • sender:
        • (plaintext)
        • (message digest)
        • (signature)
        • (sends to receiver)
      • receiver:
        • computes
        • computes
        • verifies that
  • substitution cipher

  • Caesar cipher (or shift cipher)

  • one-time pad (OTP)

  • block cipher

    • plaintext of size bits (block size)
    • key of size (key size)
    • key space:
    • ciphertext of size bits
    • encryption function:
    • decryption function:
  • block cipher mode of operation

    • electronic codebook (ECB)
    • cipher block chaining (CBC)
      • initialization vector (IV)
    • counter mode (CTR)
  • Kerckhoffs’s principle

    • Shannon’s maxim: The enemy knows the system
  • known-plaintext attack (KPA) (התקפת גלוי-ידוע)

  • ciphertext-only attack (COA) (or known ciphertext attack)

  • chosen-plaintext attack (CPA) (התקפת גלוי-נבחר)