10.1 Intro to Cryptography Flashcards

1
Q

Define cryptography

A

Cryptography is the art and science of keeping information secure through the use of mathematical concepts and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

Plaintext

A

Information in human-readable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define:

Ciphertext

A

Plaintext message that has been encrypted into an unreadable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:

Encryption

A

Process of converting plaintext to ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:

Decryption

A

Process of converting ciphertext to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:

Cipher

A

Method of performing encryption or decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:

Key

A

Parameter specifying how plaintext is converted to ciphertext and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:

Caesar Cipher

A

Type of cipher that shifts the letters in the alphabet by a fixed number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define:

Enigma cipher

A

Type of cipher used by Germany in World War II to encrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ASCII stand for and what is it?

A

ASCII stands for the American Standard Code for Information Interchange. It’s a code for representing English characters as numbers, assigned from 0 to 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the goal of encoding?

A

The goal of encoding isn’t to keep a message secret, but to transform data to be used by another system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False

Encoding, unlike encryption, does not use a key.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False

Encoding is often used to transform binary data into digital text data, where encryption commonly takes place.

A

False

Encoding is often used to transform digital text data into binary data, where encryption commonly takes place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Goals of Cryptography

What is the P.A.I.N model.

A

Privacy

Authentication

Integrity

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ keeps data secure from unauthorized parties.

A

Privacy keeps data secure from unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________ is used to confirm the identities of the sender and receiver of data.

A

Authentication is used to confirm the identities of the sender and receiver of data.

17
Q

________ ensures a message isn’t altered between when it’s sent and when it’s received.

A

Integrity ensures a message isn’t altered between when it’s sent and when it’s received.

18
Q

________ prevents the original sender from denying they were the sender.

A

Non-repudiation prevents the original sender from denying they were the sender.

19
Q

_________ apply their algorithm one bit (character) at a time.

A

Stream ciphers apply their algorithm one bit (character) at a time.

20
Q

One prominent stream cipher is the ___________

A

One prominent stream cipher is the substitution cipher.

21
Q

True or False

Substitution ciphers substitute out old values for new values of input message.

A

True

22
Q

_________ apply their algorithm to chunks of characters.

A

Block ciphers apply their algorithm to chunks of characters.

23
Q

One prominent block cipher is the _____________

A

One prominent block cipher is the transposition cipher.

  1. Break the message into blocks of three characters.
  2. Replace the first, second, and third character of each block with the third , first, and second character.
  3. Combine rearranged text.
24
Q

True or False

Ciphers use mathematical formulas known as algorithms to encrypt and decrypt data.

A

True

25
Q

The main cipher categories are _____ and ______ ciphers.

A

The main cipher categories are block and stream ciphers.

26
Q

A type of stream cipher is the _________ cipher , and a type of block cipher is the _________ cipher.

A

A type of stream cipher is the substitution cipher, and a type of block cipher is the transposition cipher.

27
Q

True or False

Substitution ciphers replace each character with a completely different character.

A

True

28
Q

Each algorithm has a possible range of numbers that can be used as a key, known as a _______.

A

Each algorithm has a possible range of numbers that can be used as a key, known as a key space.

29
Q

For modern cryptography, key space is defined by the number of binary bits used in the key, known as _______.

A

For modern cryptography, key space is defined by the number of binary bits used in the key, known as bit size.

30
Q

What is the formula for bit size?

A

Key space = 2 (to the power of bit size)

31
Q

True or False

Modern symmetric key algorithms use algorithms that are secure and fast.

A

True

32
Q

What are the widely known symmetric key algorithms?

A
  • Data Encryption Standard (DES),
  • Triple DES (3DES)
  • Advanced Encryption Standard (AES)
33
Q

What does DES stand for?

A

Data Encryption Standard (DES) is a 56-bit key published by the United States government in 1977.