Chapter 5 Flashcards

1
Q

The process of transforming readable data (plaintext/cleartext) into an unreadable form (ciphertext)

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Readable Data

A

Plaintext/Cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unreadable Data

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The science of protecting the confidentiality and integrity of data

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of recovering the plaintext message from the ciphertext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A password that you can apply to the algorithm to retrieve a message

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Testing every possible key to retrieve the original message

A

Brute Forcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An unbreakable cipher when used properly

A

One-Time Pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses the same mechanism as the Caesar Cipher, but moves each letter 13 places forwards and is a more recent cipher.

A

ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message but a certain number of letters, historically three

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses a single key for both encryption of the plaintext and decryption of the ciphertext

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext

A

Cryptography Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The science of breaking through the encryption used to create ciphertext. Finding the weakness in the given algorithm.

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ corroborates (gives support to) the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An algorithm used for cryptographic purposes

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An encryption cipher that uses the same key to encrypt and decrypt

A

Symmetric Key Cryptography

17
Q

How many disks did the Jefferson Disk contain?

A

36

18
Q

Was used to secure German communication during WWII

A

Enigma

19
Q

Who created the enigma?

A

Arthur Scherbius

20
Q

aka Private Key Cryptography

A

Symmetric Key Crytography

21
Q

aka Public Key Cryptography

A

Asymmetric Key Cryptography

22
Q

Uses a two keys. A public Key to encrypt data and a Private Key to decrypt data.

A

Asymmetric Key Cryptography

23
Q

SSL

A

Secure Sockets Layer

24
Q

The rules that define communication between devices

A

Protocols

25
Q

ECC

A

Elliptic Curve Cryptography

26
Q

Uses short keys while maintaining a higher cryptography strength than many other types of algorithms

A

Elliptic Curve Cryptography

27
Q

Converts the plaintext into a largely unique and fixed-length value.

A

Hash Functions

28
Q

Allows you to sign a message so that others can detect any changes to the message after you’ve sent it

A

Digital Signature

29
Q

Links a public key to an individual by validating that the key belongs to the proper owner. Often used as a form of electronic identification for that person.

A

Digital Certificate

30
Q

Takes a predetermined number of bits in the plaintext message and encrypts that block.

A

Block Cipher

31
Q

Encrypts each bit in the plaintext message one bit at a time

A

Stream Cipher

32
Q

Used to encrypt all our network traffic

A

Virtual Private Network

33
Q

Two main VPN methods used

A

Internet Protocol Security (IPsec) VPN
Secure Sockets Layer (SSL) VPN

34
Q

Requires a more complex hardware configuration on the back end and a software client to be installed

A

Internet Protocol Security (IPsec) VPN

35
Q

Operated from a lightweight plug-in downloaded from a webpage and a less complex hardware configuration on the back end.

A

Secure Sockets Layer (SSL) VPN

36
Q

AES

A

-

37
Q

RSA

A

-