5.3 Flashcards
A __________ is an unauthorized listener(spy).
eavesdropper
An _______ in the context of encyption, the mathematical formula used to scramble and unscramble data.
algorithm
A ______ is a value that is used to encrypt or decrypt a message.
value
T or F: A key can include numeric and alphanumeric text and special symbols.
true
A ________ is restoring the original plain text from the cipher text.
decryption
_________ is the process of converting plain text to cipher text.
encyption
_______ is the process of coding information into a form that is unreadable.
encryption
________ is an algorithm for transforming plain text to cipher text.
cipher
________ is the coded message (or) a non-readable form of the original text.
cipher text
_______ is the original message (or) an original readable textual material message or data.
plain text
___________ is the study of methods used to transmit information securely between two or more participants, so that it is unreadable by unauthorized users.
cryptography
T or F: Cryptography is an essential tool to achieve the basic goals of Information Security.
true
_________ is the science of breaking cipher texts without the knowledge of the key.
cryptanalysis
cryptography and cryptanalysis are known as _________.
cryptology
Encryption and decryption, Hash functions, Digital Signatures, and Digital Certificates (digital IDs) are some of the popular _____________.
cryptographic mechanisms