Show Menu
Cheatography

Practical Cryptographic Systems Cheat Sheet (DRAFT) by

This is a draft cheat sheet. It is a work in progress and is not finished yet.

GSM (Global System for Mobile commun­ica­tion)

GSM encryption ciphers
A5/0: No encryption
A5/1: Based on LFFRs (Linear Forward Shift Register), developed first, stronger and used in Europe and US, broken with known-­pla­intext attack
A5/2: Weakened A5/1, broken with real-time cipher­tex­t-only attack
A5/3: KASUMI, new for 3G. A block cipher vulnerable to impossible differ­ential attack and man-in­-th­e-m­iddle protocol attacks.
Delibe­rately weak cipher designs due to cost and politics.
 

Using the right primitives

Using the wrong crypto or homebrew crypto is bad (e.g. RC4 in WEP and TLS)
Sometimes people use the right ones wrong (e.g. seeing the penguin, AES-ECB)
Right crypto stop being right (e.g. MD5 and SHA1 broken)
Quantum computer poses a huge threat
 

Man-in­-th­e-m­iddle