Ch 3 Key Terms Flashcards
the practice of transforming information so that it is cleared and cannot be accessed by unauthorized parties
cryptography
steganography
algorithm
encryption
cryptography
hides the existence of the data; the appearance of a harmless image can contain hidden data
algorithm
encryption
steganography
cryptography
steganography
the process of changing the original text into a scrambled message
steganography
algorithm
encryption
cryptography
encryption
compares two bits; if bits are different, a 1 is returned, but if they are the identical, 0 is returned
XOR cipher
random numbers
diffusion
confusion
XOR cipher
numbers for which there is no identifiable pattern or sequence; no possible to predict a future number based on a previous number
random numbers
substitution cipher
security through obscurity
diffusion
random numbers
an algorithm for creating a sequence of numbers whose properties approximate those of a random number; attempts to create numbers that are as random as possible
obfuscation
pseudorandom number generator (PRNG)
security through obscurity
non-repudiation
pseudorandom number generator (PRNG)
thwart statistical analysis to make a strong algorithm; if a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing
diffusion
confusion
security through obscurity
obfuscation
diffusion
the key does not relate in a simple way to the ciphertext; each character of the ciphertext should depend upon several different parts of the key; forces the hacker to create the entire key simultaneously, a difficult task, rather than trying to recreate the key piece by piece.
diffusion
data-in-transit
security through obscurity
confusion
confusion
the process of proving that a user performed an action such as sending an email message
obfuscation
security through obscurity
high resiliency
non-repudiation
non-repudiation
making something obscure or unclear; cryptography can help ensure obfuscation by hiding the details so that the original code cannot be determined
obfuscation
hash
data-at-rest
security through obscurity
obfuscation
virtually any system can be made secure so long as outsiders are unaware of it or how it functions
high resiliency
security through obscurity
obfuscation
non-repudiation
security through obscurity
data that is stored on electronic media
data-in-transit
data-at-rest
data-in-use
checksum
data-at-rest
small amount of time that occurs between when something is input into a cryptographic algorithm and the time the output is obtained
checksum
high resiliency
low latency
low-power devices
low latency
takes one character and replaces it with one character
hash
hash algorithms
stream cipher
block cipher
stream cipher
manipulates an entire block of plaintext at one time
block cipher
checksum
stream cipher
hash
block cipher
hash algorithms
MD5, 3DES, RIPEMD
MD5, SHA, RIPEMD
MDA, SHA, RIPEMD
MD5, SHA, RSA
MD5, SHA, RIPEMD
symmetric algorithms
AES, MD5, RC4
AES, RSA, RC4
DSA, Blowfish, RC4
AES, Blowfish, RC4
AES, Blowfish, RC4
Asymmetric algorithms
DSA, RC4, ECC
DSA, RSA, AES
DSA, RSA, ECC
DSA, RSA, SHA
DSA, RSA, ECC
use the same single key to encrypt and decrypt a document; designed to encrypt and decrypt the ciphertext
digital signature
Symmetric cryptographic algorithms
ECC
Asymmetric Cryptographic Algorithms
Symmetric cryptographic algorithms
public key cryptography; uses two keys (public & private) instead only one that are mathematically related
digital signature
Asymmetric Cryptographic Algorithms
Symmetric cryptographic algorithms
DHE
Asymmetric Cryptographic Algorithms
an alternative for prime-number-based asymmetric cryptography for mobile and wireless devices; offers security with smaller key sizes compared to other asymmetric cryptography
hash
Key exchange
ECC
digital signature
ECC
an electronic verification of the sender
digital signature
Key exchange
Diffie-Hellman (DH)
Asymmetric Cryptographic Algorithms
digital signature
resolves the problem of sending and receiving keys; any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
Key exchange
diffusion
digital signature
Diffie-Hellman (DH)
Key exchange
a large prime number and related integer; creating the same key
Diffie-Hellman (DH)
digital signature
AES
ECC
Diffie-Hellman (DH)