Define Cryptology
Cryptology = Science concerned with communications in secure and usually secret form.
Define Cryptography
Cryptography = Study of the principles and techniques by which information can be concealed in ciphertext and later revealed by a secret key.
Define Cryptanalysis and its types
Cryptanalysis = The Science/process of recovering information (plaintext or key) from ciphers without the knowledge of the key.
Types:
What is the Encryption of data?
The process of transforming plaintext data into ciphertext to conceal it’s meaning.
What is the Signing of data?
Computing a “check value” or “digital signature” to a cipher/plaintext, that can be verified by some or all entities able to access the signed data.
Describe the principal categories of cryptographic algorithms:

Graphically describe the Cryptographic Algorithms outline:

What is the aim of the Cryptanalysis of public keys?
Public key cryptanalysis aim at breaking the cryptosystem itself through mathematical research.
What does a Brute Force Attack does?
A brute force attack tries every possible key until it finds an intelligible plaintext.
Every cryptographic algorithm (in theory can be attacked by brute force). On average, 50% of possible keys will have to be tried.
What is Error propagation?
Error propagation characterizes the effects of bit-errors during transmission of ciphertext to reconstructed plaintext.
An erroneous ciphertext bit could produce 1 or more erroneous plaintext bits.
What is Synchronization?
Synchronization characterizes the effects of lost ciphertext data units to the reconstructed plaintext.
Some algorithms need explicit synchronization (can’t recover from lost ciphertext). Other algorithms automatically re-synchronize after 0 to n ciphertext bits.
What is Substitution?
Mapping each element (bit, letter, groups of bits/letters) in the plaintext into another element.
What is Transposition?
Re-arranging elements in the plaintext.
What is the main difference between Stream ciphers and Block ciphers?
Stream ciphers work on bit streams (encrypting one bit after another). Based on linear feedback shift registers. They don’t propagate errors but are sensible to loss of synchronization.
Block ciphers work on blocks of width b. They handle errors and synchronization in different ways.
What are Modes of Operation?
Ways of using a block cipher (of b-lenght) for encryption.
How do stream ciphers encrypt a message?
They encrypt the digits of a message one at a time.
How does block ciphers encrypt?
Taking a chunk/number of bits and encrypt them as single units, padding them to have a multiple of the block size.
What are the types of cryptanalysis?
What is the aim of the cryptanalysis of public key cryptography?
Describe the key elements of Symmetric Encryption:
What is ECB and describe how it works:
ECB = Electronic Code Book Mode.

What is CBC and describe how it works:
CBC = Cipher Block Chaining Mode.

How is the decryption process in CBC?
In CBC, decryption is the inverted process of the encryption steps:
What is CFB and describe how it works:
CFB = Ciphertext Feedback Mode.