Chapter 2 Flashcards

1
Q

is the process of converting plain text, which can be seen by anyone, into an incomprehensible form of ciphertext. is the process of converting ciphertext back into plaintext, so that it can be understood.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The mathematical function used in these conversion process is called

A

cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the process of converting ciphertext back into plaintext, so that it can be understood.

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It can be divided into the symmetric key cryptosystem, in which encryption key and the decryption key are the same, and public key cryptosystem, in which the encryption key and the decryption key are different, depending on whether the encryption key and the decryption are the same.

A

Cryptographic techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It refers to the protocols that use cryptographic techniques. As a protocol means a series of finite phases in which is more than 2 persons participate to achieve a certain purpose, the cryptographic protocol should prevent repudiation by a participant, or a third party, to ensure a certain purpose of the concerned cryptographic protocol (authentication, confidentiality, integrity, and non-repudiation, etc.) as well as the meaning of each message.

A

Cryptographic protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All the elements that are needed for a series of encryption and decryption processes are called

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The secret key encryption algorithm has the advantage that the encryption key used for encryption and the decryption key used for decryption are the same. And that the length od the key may be short, and the speed of encryption and decryption operations is fast.

A

Private key cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It performs the encryption and decryption process, using cryptographic algorithm that transforms fixed size input blocks into fixed size output blocks using a secret key. The block cipher algorithm includes Feistel Network, Data Encryption Standard(DES), Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), SEED, and ARIA.

A

Block Cipher Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A stream cipher is a method developed mainly in Europe. Ciphertext is created by bitwise XOR operation of the plaintext bit string, and bit string of the key. RC$ is representative stream cipher, and there are other algorithm, such as A5/1 and A5/2.

A

Stream Cipher Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A mathematical function that outputs a short hash value (hash code) with a fixed length from random data of various.

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly