Chapter 8 Flashcards
Cryptography
The study of cryptographic algorithms 245
Ciphering
The process of using cipher to encode characters 245
Substitution Cipher
A type of coding or ciphering system that changes one character or symbol into another 246
Like a cryptogram 246
Multi-Alphabet Substitution
Really cool way to cipher a message. Takes substitution to the next level by changing the formula with every character 246
Transposition Cipher
Involves transposing or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled 246
ROT13
rotates every letter 13 places in the alphabet
Little orphan Annie!
Stegography
process of hiding a message in a medium such as a digital image
Most commonly by changing the least significant bit 248
Symmetric Algorithms
Requires both ends of an encrypted message to have the same key and processing algorithms.
Asymmetric Algorthms
Use two keys to encrypt and decrypt data. The two keys are known as a public key and a private key
Types of Key exchange
In-band key exchange: the key is exchanged within the same communications channel is encrypted
Out-of-band key exchange: Key is exchanged in a different channel
ECC
Elliptic Curve Cryptography
uses small keys.
MD
Message Digest Algorithm
Creates a hash value and uses a one way hash
Key stretching
processes used to take a key that might be a bit weak and make it stronger usually by making it longer
256
Frequency Analysis
looking at blocks of an encrypted message to determine if any common patterns exist
257
Brute-Force Attacks
Applying every possible combination of characters that could be the key
257