Architecture and Engineering Part2 Flashcards
1
Q
Plaintext vs. Ciphertext:
A
- Definition: Plaintext is the original, unencrypted message, while ciphertext is the scrambled or encrypted version of that message.
2
Q
Frequency Analysis:
A
- Definition: A technique used in cryptanalysis to analyze the frequency of letters, characters, or patterns in ciphertext to deduce information about the underlying plaintext.
3
Q
Cryptanalysis:
A
- Definition: The process of analyzing and breaking encryption codes or ciphers to decipher the original message or reveal vulnerabilities in the encryption method.
4
Q
Out-of-band:
A
- Definition: Communication or data transfer that occurs using a separate channel or medium, often to enhance security and reduce the risk of interception.
5
Q
Key (and Key Generation):
A
- Definition: A key is a secret or unique value used in encryption algorithms to transform plaintext into ciphertext. Key generation is the process of creating these keys.
6
Q
Substitution/Transposition Cipher:
A
- Definition: Encryption methods where characters in the plaintext are replaced (substitution) or rearranged (transposition) to create ciphertext.
7
Q
Algorithm:
A
- Definition: A set of well-defined instructions or rules used in encryption to perform specific tasks, such as data transformation.
8
Q
Block Mode Encryption:
A
- Definition: A method of encryption that divides data into fixed-size blocks before encrypting them, often used in symmetric encryption.
9
Q
Key Pair (Asymmetric Encryption):
A
- Definition: In asymmetric encryption, a key pair consists of a public key (used for encryption) and a private key (used for decryption), providing enhanced security.
10
Q
Message Digest:
A
- Definition: A fixed-length string of characters generated from the original message or data using a hash function, often used for data integrity verification.
11
Q
Work Factor:
A
- Definition: The amount of effort or computational resources required to break an encryption scheme or cryptographic system, often used to assess security.
12
Q
Non-Repudiation:
A
- Definition: The assurance that the sender of a message cannot deny its transmission, ensuring accountability in digital communications.
13
Q
Private Key & Public Key:
A
- Definition: In asymmetric encryption, the private key is kept secret and used for decryption, while the public key is openly shared and used for encryption.
14
Q
In Band:
A
- Definition: Communication or data transfer that occurs using the same channel or medium, which may be less secure than out-of-band communication.
15
Q
Key Escrow:
A
- Definition: The practice of securely storing encryption keys with a trusted third party, often used for recovery or legal purposes.
16
Q
Encoding and Encryption:
A
- Definition: Encoding involves transforming data for reliable transmission, while encryption involves scrambling data to protect its confidentiality.
17
Q
Decoding and Decryption:
A
- Definition: Decoding is the process of converting encoded data back to its original format, while decryption is the process of converting ciphertext back to plaintext.
18
Q
Key Space:
A
- Definition: The total number of possible keys in an encryption system, often used to assess the level of security.
19
Q
Cryptography:
A
- Definition: The science and practice of securing communication and data through encryption, often used to protect the confidentiality and integrity of information.
20
Q
Hashes and Hash Function:
A
- Definition: Hashes are fixed-length strings generated from data using a hash function, used for data integrity verification and password storage.
21
Q
Collision:
A
- Definition: In hashing, a collision occurs when two different inputs produce the same hash output, which can compromise data integrity.
22
Q
Symmetric/Asymmetric Encryption:
A
- Definition: Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a key pair (public and private keys).
23
Q
Session Key:
A
- Definition: A temporary encryption key used for a single communication session, often generated on the fly for enhanced security.
24
Q
CPTED:
A
- Definition: Crime Prevention Through Environmental Design (CPTED) is a concept that focuses on designing physical spaces to reduce opportunities for crime and enhance security.