ch 3 Flashcards
scrambling information so i cannot be read
cryptography
hides the existing data in other pieces of data/ image audio or video
steganography
information within the data
meta data
data stored or transmitted without encryption
cleartext data
procedures based on a mathematical formula used to encrypt and decrypt the data
cryptographic algorithm
mathematical value entered into the algorithm to produce the cipher text
key
substitutes one character for another
substitution cipher
based on the binary operation exclusive or that compares to two bits
XOR Cipher
software that relies upon an algorithm for creating a sequence of numbers whose properties approximate those of random number.
(PRNG) Pseudorandom number generator
if a single character of plaintext is changed then it should result in multiple characters of the cipher text change
diffusion
the key not relate in simple way to the cipher text
confusion
ensures only authorized parties can view it
confidentiality
ensures information is correct and unaltered
integrity
ensures sender can be verified through cryptography
authentication
provides that a user performed an action
non-repudiation
making something obscure or unclear
obfuscation
data actions being performed by “endpoint devices”
data in use
actions that transmit the data across the network
data in transit
data is stored on electronic media
data at rest
the ability to quickly recover the resources vs. security constraints
high resiliency
takes one character and replaces it with another (RC-4)
stream cipher
manipulates an entire block of plaintext at one time
block cipher
takes a input string of any length and returns a string of any requested variable length
sponge function
creates a unique “digital fingerprint “ of a set of data. (symmetric cryptographic algorithms and asymmetric cryptographic algorithms
hashing
short and long data sets that have the same size hash
fixed size