401_4 Flashcards
What are the three general types of cryptosystems?
- Symmetric
- Asymmetric
- Hash
What does cryptography mean?
Hidden writing
What two distinct operations does every cryptographic algorithm perform?
- Encryption
2. Decryption
In cryptography, what is the mathematical formula used to encrypt a message called?
Encryption Algorithm or Cipher
Once a message has been transformed with a cipher, what is the resulting message called?
Ciphertext
Cryptographically speaking, what is the collection of all possible inputs and all possible outputs, in addition to the algorithm and keys called?
Cryptosystem
The Rijndael algorithm cannot be “broken” for how many years?
14 Trillion
Who creates encryption algorithms?
cryptographers
What do cryptanalysts dedicate their lives to doing?
breaking ciphers
What is the generic term given to the study of both cryptgrphay and crytanalysis?
Cryptology
The strength of a cryptosystem rests with the strength of its _______.
Keys
128-bit keys offer approximately how many times more protection than 40-bit keys?
A trillion
although it is obvious that a 128-bit key is longer than a 40-bit key, the difference in the amount of protection ___________, not _________.
exponential, not linear
What are the goals of a cryptosystem?
- Confidentiality
- Integrity
- Authentication
- Non-repudiation
What are the two basic methods of symmetrically encrypting or garbling text?
- Substitution
2. Permutation
What boolean function is one of the fundamental operations used in cryptography?
Exclusive OR (XOR)
When is the output of an XOR true?
If exactly one of the inputs is true.
With respect to encryption techniques, ________, also called ________, shuffles the order in which characters (or bytes) appear rather than substituting one for another.
Permutation
Transposition
Which type of cryptosystem uses a single key for both encryption and decryption?
Symmetric Key Cryptography
What is the primary application of symmetric encryption?
Privacy
Which type of cryptosystem uses two keys: one used for encryption and the other for decryption?
Asymmetric Key Cryptography or Public Key Cryptography