CH-8 Encryption Flashcards
What is Cryptography?
–The practice and study of how to secure communications
–Constructing protocols that prevent unauthorized access –Requires mathematics
How does Single/symmetric key encryption work?
– One secret key used to encrypt and decrypt
– Uses Stream or Block Ciphers
How does Public/asymmetric key encryption work?
– Two keys in a pair; one public and one private
– Public key is shared and used to encrypt – Private key is not shared; required for decryption
What is Key in Cryptography?
Key: Bits that are combined with plain text to encrypt it
What is Cipher tex in Cryptography?
Cipher text: The encrypted text
What is an Algorithm in Cryptography?
Algorithm: A mathematical process for doing something
What is shift cipher?
Caesar Cipher Uses a substitution alphabet Caesar is a mono alphabetic cipher Frequency distribution cracks this simple cipher
What is ATBASH
Reverses letters in the alphabets, so A becomes Z (substitution)
What is Rail Fence?
Writing message on alternating lines, e.g. a zigzag (transposition)
What is Vigenere?
Series of interwoven Caesar ciphers
What is Enigma Encryption?
–Series of rotors, each representing different 26 char substitution ciphers –Rotors on corresponding machines needed to be lined up –Rotors were changed daily based on secret key lists distributed in advance
What is XOR?
XOR is a binary operation. Fun fact! XOR is the only reversible binary operation
How does XOR work?
- First, convert plain text to ASCII 2. Then, convert ASCII to binary. XOR, or “exclusive or” operates on binary data. It returns true if both of its inputs are opposites (one false and one true), otherwise, it returns false. Input Output A B 0 0 0 1 0 1
What is Link Encryption?
Link encryption is an approach to communications security that encrypts and decrypts all network traffic at each network routing point until arrival at its final destination.
What is End to End Encryption?
A technique in which communication traveling along a network is encrypted and decrypted at every stage, or node. It is used to prevent traffic analysis and avoid human error.