Chapter 5 Flashcards
The process of transforming readable data (plaintext/cleartext) into an unreadable form (ciphertext)
Encryption
Readable Data
Plaintext/Cleartext
Unreadable Data
Ciphertext
The science of protecting the confidentiality and integrity of data
Cryptography
The process of recovering the plaintext message from the ciphertext
Decryption
A password that you can apply to the algorithm to retrieve a message
Key
Testing every possible key to retrieve the original message
Brute Forcing
An unbreakable cipher when used properly
One-Time Pad
Uses the same mechanism as the Caesar Cipher, but moves each letter 13 places forwards and is a more recent cipher.
ROT13
An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message but a certain number of letters, historically three
Caesar Cipher
Uses a single key for both encryption of the plaintext and decryption of the ciphertext
Symmetric Key Cryptography
The specifics of the process used to encrypt the plaintext or decrypt the ciphertext
Cryptography Algorithm
The science of breaking through the encryption used to create ciphertext. Finding the weakness in the given algorithm.
Cryptoanalysis
______________ corroborates (gives support to) the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information
Authentication
An algorithm used for cryptographic purposes
Cipher
An encryption cipher that uses the same key to encrypt and decrypt
Symmetric Key Cryptography
How many disks did the Jefferson Disk contain?
36
Was used to secure German communication during WWII
Enigma
Who created the enigma?
Arthur Scherbius
aka Private Key Cryptography
Symmetric Key Crytography
aka Public Key Cryptography
Asymmetric Key Cryptography
Uses a two keys. A public Key to encrypt data and a Private Key to decrypt data.
Asymmetric Key Cryptography
SSL
Secure Sockets Layer
The rules that define communication between devices
Protocols
ECC
Elliptic Curve Cryptography
Uses short keys while maintaining a higher cryptography strength than many other types of algorithms
Elliptic Curve Cryptography
Converts the plaintext into a largely unique and fixed-length value.
Hash Functions
Allows you to sign a message so that others can detect any changes to the message after you’ve sent it
Digital Signature
Links a public key to an individual by validating that the key belongs to the proper owner. Often used as a form of electronic identification for that person.
Digital Certificate
Takes a predetermined number of bits in the plaintext message and encrypts that block.
Block Cipher
Encrypts each bit in the plaintext message one bit at a time
Stream Cipher
Used to encrypt all our network traffic
Virtual Private Network
Two main VPN methods used
Internet Protocol Security (IPsec) VPN
Secure Sockets Layer (SSL) VPN
Requires a more complex hardware configuration on the back end and a software client to be installed
Internet Protocol Security (IPsec) VPN
Operated from a lightweight plug-in downloaded from a webpage and a less complex hardware configuration on the back end.
Secure Sockets Layer (SSL) VPN
AES
-
RSA
-