Chapter 4: Applied Cryptography Flashcards

1
Q

a well-ordered collection of unambiguous and effectively computable operations that, when executed, produced a result and halts in a finite amount of time.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the art of achieving security by encoding messages to make them non-readable.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the science of encryption, which encompasses cryptography and cryptanalysis.

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the process of making and using codes to secure the transmission of information.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the process of obtaining the plaintext message from a cyphertext without knowing the keys.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the person who attempt to break a ciphertext.

A

Cryptanalyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an encryption method or process encompassing the algorithm, keys, and procedures to perform encryption and decryption.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the process of using the key to produce a ciphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the process of using the key to produce the plaintext from the ciphertext.

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

info used in cipher known only to the sender / receiver.

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the original unencrypted text.

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 DIMENSIONS OF CLASSIFYING CRYPTOGRAPHIC SYSTEMS

A
  1. Type of Operation Used
  2. Number of Keys Used
  3. Way of Processing Plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 POPULAR CRYPTOGRAPHIC ALGORITHMS

A
  1. Substitution (Confusion)
  2. Transposition (Diffusion)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

replaces one or more character with other characters.

A

Substitution (Confusion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 TYPE OF SIBSTITUTION (CONFUSION) ALGORITHM

A
  • Monoalphabetic Cipher
  • Caesar Cipher
  • Playfair Cipher
  • Polyalphabetic Cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

also known as a simple substitution cipher, relied on a fixed replacement structure.

A

Monoalphabetic Cipher

17
Q

also known as the shift cipher.

A

Caesar Cipher

18
Q

the best-known multi-letter encryption, it treats diagram in the plaintext as single units and translates these units into cipher diagram.

A

Playfair Cipher

19
Q

is any cipher based on substitution, using multiple substitution alphabets.

A

Polyalphabetic Cipher

20
Q

uses a simple form of polyalphabetic cipher

A

Vigenère Cipher

21
Q

A type of cryptographic algorithm that rearrange one or more character within the text.

A

Transposition (Diffusion)

22
Q

involved writing the plaintext out in rows, and then reading the ciphertext out of in columns one by one.

A

Simple Columnar Transposition