Architecture and Engineering Part2 Flashcards

1
Q

Plaintext vs. Ciphertext:

A
  • Definition: Plaintext is the original, unencrypted message, while ciphertext is the scrambled or encrypted version of that message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Analysis:

A
  • Definition: A technique used in cryptanalysis to analyze the frequency of letters, characters, or patterns in ciphertext to deduce information about the underlying plaintext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis:

A
  • Definition: The process of analyzing and breaking encryption codes or ciphers to decipher the original message or reveal vulnerabilities in the encryption method.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Out-of-band:

A
  • Definition: Communication or data transfer that occurs using a separate channel or medium, often to enhance security and reduce the risk of interception.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key (and Key Generation):

A
  • Definition: A key is a secret or unique value used in encryption algorithms to transform plaintext into ciphertext. Key generation is the process of creating these keys.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Substitution/Transposition Cipher:

A
  • Definition: Encryption methods where characters in the plaintext are replaced (substitution) or rearranged (transposition) to create ciphertext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Algorithm:

A
  • Definition: A set of well-defined instructions or rules used in encryption to perform specific tasks, such as data transformation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Mode Encryption:

A
  • Definition: A method of encryption that divides data into fixed-size blocks before encrypting them, often used in symmetric encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Pair (Asymmetric Encryption):

A
  • Definition: In asymmetric encryption, a key pair consists of a public key (used for encryption) and a private key (used for decryption), providing enhanced security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Message Digest:

A
  • Definition: A fixed-length string of characters generated from the original message or data using a hash function, often used for data integrity verification.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Work Factor:

A
  • Definition: The amount of effort or computational resources required to break an encryption scheme or cryptographic system, often used to assess security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-Repudiation:

A
  • Definition: The assurance that the sender of a message cannot deny its transmission, ensuring accountability in digital communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Private Key & Public Key:

A
  • Definition: In asymmetric encryption, the private key is kept secret and used for decryption, while the public key is openly shared and used for encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Band:

A
  • Definition: Communication or data transfer that occurs using the same channel or medium, which may be less secure than out-of-band communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Escrow:

A
  • Definition: The practice of securely storing encryption keys with a trusted third party, often used for recovery or legal purposes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encoding and Encryption:

A
  • Definition: Encoding involves transforming data for reliable transmission, while encryption involves scrambling data to protect its confidentiality.
17
Q

Decoding and Decryption:

A
  • Definition: Decoding is the process of converting encoded data back to its original format, while decryption is the process of converting ciphertext back to plaintext.
18
Q

Key Space:

A
  • Definition: The total number of possible keys in an encryption system, often used to assess the level of security.
19
Q

Cryptography:

A
  • Definition: The science and practice of securing communication and data through encryption, often used to protect the confidentiality and integrity of information.
20
Q

Hashes and Hash Function:

A
  • Definition: Hashes are fixed-length strings generated from data using a hash function, used for data integrity verification and password storage.
21
Q

Collision:

A
  • Definition: In hashing, a collision occurs when two different inputs produce the same hash output, which can compromise data integrity.
22
Q

Symmetric/Asymmetric Encryption:

A
  • Definition: Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a key pair (public and private keys).
23
Q

Session Key:

A
  • Definition: A temporary encryption key used for a single communication session, often generated on the fly for enhanced security.
24
Q

CPTED:

A
  • Definition: Crime Prevention Through Environmental Design (CPTED) is a concept that focuses on designing physical spaces to reduce opportunities for crime and enhance security.