4.5.6 Representing images, sound and other data Flashcards

1
Q

What is encryption?

A

The process of scrambling data so that it cannot be understood if intercepted in order to keep it secure during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is plaintext?

A

Unencrypted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ciphertext?

A

Encrypted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cipher?

A

Type of encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is needed to decrypt ciphertext?

A

You must know the encryption method used and the key used to encrypt the method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do Caesar ciphers work?

A
  • Information is encrypted by replacing characters.

* One character is always replaced by the same character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of caesar cipher?

A

Shift Cipher

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does shift cipher work?

A
  • All of the letters in the alphabet are shifted by the same amount.
  • Amount by which characters are shifted forms the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do substitution cipher work?

A

Letters are randomly replaced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the disadvantage of cipher caesars?

A
  • Easily cracked
  • The frequency at which each character occurs can provide a clue, one a single character is discovered, a shift cipher can be completely cracked as the key is found.

Substitution ciphers are still relatively easy to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a one pad cipher?

A

Each key should only ever be used once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of cipher is vernam?

A

One time pad cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Vernam cipher require?

A

Key should be random and at least as long as the plaintext that is to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Vernam cipher work?

A
  • Aligning the characters of the plaintext and the key
  • Converting each character to binary, using an information coding system.
  • Applying a logical XOR operation to the two bit patterns
  • Converting the result back to a character
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is Vernam cipher completely secure?

A

• The key used is chosen at random, the ciphertext is also random so it is considered completely secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the security of ciphers?

A

• All ciphers are in theory crackable, but not within a reasonable timeframe given current computing power.

17
Q

What is computational security?

A

Ciphers that rely on not being cracked in a reasonable timeframe given current computing power.