CYG Chapter 1 Introduction
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction
Set of flashcards Details
Flashcards | 15 |
---|---|
Language | English |
Category | Computer Science |
Level | University |
Created / Updated | 21.03.2017 / 13.04.2017 |
Weblink |
https://card2brain.ch/box/20170321_cyg_chapter_1_introduction
|
Embed |
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_1_introduction/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
What is the definition of cryptography?
[definition.introduction]
“Cryptography is the study of mathematical techniques related to aspects of information security.”
What are the forms of information security?
[definition.introduction, 4]
1. Confidentiality
2. Data integrity
3. Entity authentication
4.Data origin authentication
What are the topics of cryptography?
[topics.introduction, 4]
1. Concealing data from eavesdroppers and only available to entitled users
2. Authentication of users and messages
3. Anonymity
4. Protocols for transmission and key management
What was before 1975?
[history.introduction]
Cryptography was mostly developed by the military
What was in the late 1970s?
[history.introduction]
Networks established, leading to growing interest in protecting privacy and confidentiality
What was in 1976?
[history.introduction]
Diffie and Hellman with paper ‘New Directions in Cryptography’
What did the paper ‘New Directions in Cryptography’ introduced?
[diffiehellman.history.introduction]
Public-key technique
By which today’s applications is the technique used?
[diffiehellman.history.introduction, 6]
1. e-banking
2. e-commerce
3. e-cash
4.Automatic debiting
5. Computer access controls
6. Secure communication
What are the notations of participants in communication?
[notation.fundamentalknowledge.introduction, 3]
1. Alice
2. Bob
3. If required, continue alphabetic with (for example) Cherie
What are the notations of opponents in communication?
[notation.fundamentalknowledge.introduction, 2]
1. Oskar
2. Eve // From eavesdropping
Name institutions for cryptography?
[institutions.fundamentalknowledge.introduction, 3]
1. NSA
2. IACR
3. BSI
What are the characteristics?
[NSA.institutions.fundamentalknowledge.introduction, 2]
1. Founded in 1952
2. Largest employer for mathematicians
What are the characteristics?
[IACR.institutions.fundamentalknowledge.introduction, 2]
1. Founded in 1983
2. Three conferences per year
Which are the three conferences?
[IACR.institutions.fundamentalknowledge.introduction, 3]
1. CRYPTO in the USA, 2. EUROCRYPT and 3. ASIACRYPT
What are the characteristics?
[BSI.institutions.fundamentalknowledge.introduction, 2]
1. In Bonn
2. Most important institution in Germany