5) Cryptography Flashcards
The act of scrambling plain text into cyphertext.
Encryption
(T/F) A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.
True
An encryption cipher that uses the same key to encrypt and decrypt.
Symmetric key
(T/F) Hashes provide confidentiality and integrity.
False
Hashes only provide integrity.
An algorithm used for cryptographic purposes.
Cipher
___ corroborates the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information.
Authentication
The science of keeping information secure.
Cryptography
The science of breaking through the encryption used to create the cyphertext.
Cryptanalysis
The overarching field of study that covers cryptography and cryptanalysis.
Cryptology
The specifics of the process used to encrypt the plaintext or decrypt the ciphertext.
Cryptographic algorithm
Another name for unencrypted data.
Plaintext (cleartext)
Another name for encrypted data.
Ciphertext
An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message by a certain number of letters, historically three.
Caesar cipher
This more recent cipher uses the same mechanism as the Caesar cipher but moves each letter 13 places forward.
ROT13 cipher
Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext.
Symmetric key cryptography
A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block.
Block cipher
A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time.
Stream cipher
A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode.
AES