Ch 3 Key Terms Flashcards
the practice of transforming information so that it is cleared and cannot be accessed by unauthorized parties
cryptography
steganography
algorithm
encryption
cryptography
hides the existence of the data; the appearance of a harmless image can contain hidden data
algorithm
encryption
steganography
cryptography
steganography
the process of changing the original text into a scrambled message
steganography
algorithm
encryption
cryptography
encryption
compares two bits; if bits are different, a 1 is returned, but if they are the identical, 0 is returned
XOR cipher
random numbers
diffusion
confusion
XOR cipher
numbers for which there is no identifiable pattern or sequence; no possible to predict a future number based on a previous number
random numbers
substitution cipher
security through obscurity
diffusion
random numbers
an algorithm for creating a sequence of numbers whose properties approximate those of a random number; attempts to create numbers that are as random as possible
obfuscation
pseudorandom number generator (PRNG)
security through obscurity
non-repudiation
pseudorandom number generator (PRNG)
thwart statistical analysis to make a strong algorithm; if a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing
diffusion
confusion
security through obscurity
obfuscation
diffusion
the key does not relate in a simple way to the ciphertext; each character of the ciphertext should depend upon several different parts of the key; forces the hacker to create the entire key simultaneously, a difficult task, rather than trying to recreate the key piece by piece.
diffusion
data-in-transit
security through obscurity
confusion
confusion
the process of proving that a user performed an action such as sending an email message
obfuscation
security through obscurity
high resiliency
non-repudiation
non-repudiation
making something obscure or unclear; cryptography can help ensure obfuscation by hiding the details so that the original code cannot be determined
obfuscation
hash
data-at-rest
security through obscurity
obfuscation
virtually any system can be made secure so long as outsiders are unaware of it or how it functions
high resiliency
security through obscurity
obfuscation
non-repudiation
security through obscurity
data that is stored on electronic media
data-in-transit
data-at-rest
data-in-use
checksum
data-at-rest
small amount of time that occurs between when something is input into a cryptographic algorithm and the time the output is obtained
checksum
high resiliency
low latency
low-power devices
low latency
takes one character and replaces it with one character
hash
hash algorithms
stream cipher
block cipher
stream cipher
manipulates an entire block of plaintext at one time
block cipher
checksum
stream cipher
hash
block cipher