Chapter 6 Cryptography and Symmetric Key Algorithms Flashcards
To encrypt a message, you simply shift each letter of the alphabet three places to the
right
Caesar cipher r .
a cryptographic system should be secure
even if everything about the system, except the key, is public knowledge.
The Kerchoff Principle
random number that acts as a placeholder variable in mathematical functions.
nonce
Zero-Knowledge Proof
zero-knowledge proof
When the information or privilege required to perform an operation is divided among
multiple users, no single person has suffi cient privileges to compromise the security
of an environment.
Split Knowledge
a minimum number of agents out of the total number of agents work together to perform high-security tasks.
M of N Control
cryptographic systems of symbols that represent words or phrases,
Codes
always meant to hide the true meaning of a message
Ciphers
________ use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.
Transposition ciphers
use a different substitution alphabet for each letter of the plaintext message.
one-time pad
the encryption key is as long as the m r essage itself and is often
chosen from a common book
running key cipher
the relationship between the plain text
and the key is so complicated that an attacker can’t merely continue altering the plain
text and analyzing the resulting ciphertext to determine the key.
Confusion
a change in the plain text results in multiple changes spread throughout the ciphertext.
Diffusion
Advanced Encryption Standard (AES)
Block Size____ bits
Key Size _____ bits
Block Size - 128
Key size - 128, 192, 256
Skipjack
Block Size____ bits
Key Size _____ bits
Block Size 64
Key size 80