5) Cryptography Flashcards
The act of scrambling plain text into cyphertext.
Encryption
(T/F) A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.
True
An encryption cipher that uses the same key to encrypt and decrypt.
Symmetric key
(T/F) Hashes provide confidentiality and integrity.
False
Hashes only provide integrity.
An algorithm used for cryptographic purposes.
Cipher
___ corroborates the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information.
Authentication
The science of keeping information secure.
Cryptography
The science of breaking through the encryption used to create the cyphertext.
Cryptanalysis
The overarching field of study that covers cryptography and cryptanalysis.
Cryptology
The specifics of the process used to encrypt the plaintext or decrypt the ciphertext.
Cryptographic algorithm
Another name for unencrypted data.
Plaintext (cleartext)
Another name for encrypted data.
Ciphertext
An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message by a certain number of letters, historically three.
Caesar cipher
This more recent cipher uses the same mechanism as the Caesar cipher but moves each letter 13 places forward.
ROT13 cipher
Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext.
Symmetric key cryptography
A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block.
Block cipher
A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time.
Stream cipher
A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode.
AES
AES shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode. What does TCB stand for?
Tweaked CodeBook
Also known as public key cryptography, this method uses two keys: a public key and a private key.
Asymmetric key cryptography
Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic.
SSL protocol
SSL protocol uses the RSA algorithm to secure web and email traffic. What does SSL stand for?
Secure Sockets Layer
Also referred to as message digests, these functions do not use a key.
Hash functions
These provide integrity (but not confidentiality) and are used to determine whether the message has changed.
Hashes