Chapter 5 Flashcards
The process of transforming readable data (plaintext/cleartext) into an unreadable form (ciphertext)
Encryption
Readable Data
Plaintext/Cleartext
Unreadable Data
Ciphertext
The science of protecting the confidentiality and integrity of data
Cryptography
The process of recovering the plaintext message from the ciphertext
Decryption
A password that you can apply to the algorithm to retrieve a message
Key
Testing every possible key to retrieve the original message
Brute Forcing
An unbreakable cipher when used properly
One-Time Pad
Uses the same mechanism as the Caesar Cipher, but moves each letter 13 places forwards and is a more recent cipher.
ROT13
An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message but a certain number of letters, historically three
Caesar Cipher
Uses a single key for both encryption of the plaintext and decryption of the ciphertext
Symmetric Key Cryptography
The specifics of the process used to encrypt the plaintext or decrypt the ciphertext
Cryptography Algorithm
The science of breaking through the encryption used to create ciphertext. Finding the weakness in the given algorithm.
Cryptoanalysis
______________ corroborates (gives support to) the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information
Authentication
An algorithm used for cryptographic purposes
Cipher