CH2 Flashcards
A set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys.
Public key infrastructure (PKI)
The study of the techniques used for encryption and secure communications
Cryptography
The study of how to crack encryption algorithms or their implementations
Cryptoanalysis
A set of rules, which can also be called an algorithm, about how to perform encryption or decryption.
Cipher
What are 3 common methods that ciphers use
Substitution, Polyalphabetic, Transposition
This type of cipher substitutes one character for another
Substitution
This type of cipher substitutes one character for another but uses multiple alphabets and switches between them by some trigger character in the encoded message
Polyalphabetic
This cipher method uses many different options, including the rearrangement of letters.
Transposition
The instructions for how to reassemble
Key
A symmetric key cipher (same key used to encrypt and decrypt) that operates on a group of bits called a block.
Block cipher
List 5 examples of block cipher algorithms
AES, 3DES, Blowfish, DES, IDEA
A symmetric key cipher where the plaintext data to be encrypted is done a bit at a time against the bits of the key stream.
Stream cipher
Which type of encryption algorithm is faster to use and requires less CPU … Symmetric or Assymmetric?
Symmetric
What is the minimum recommended key length for a symmetric encryption algorithm to be considered safe?
128 bits
What is an example of an asymmetric algorithm?
public key algorithm