Chapter 8 Cryptography Flashcards

1
Q

Cryptography

Pg.245

A

The science of altering information so that it cannot be decoded without a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

pg.245

A

a method used to encode characters to hide their value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Substitution Ciphers

pg.246

A

a type of coding or ciphering system that changes one character or symbol into another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ceasar Cipher

pg.246

A

oldest known substitution ciphers known for shifting all letters a certain number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vigenere cipher

pg.246

A

uses keyword to look up the cipher text in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transposition cipher

pg.246

A

involves transposing or scrambling the letters in a certain manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rail Fence Cipher

pg.247

A

the message letters out diagonally over a number or rows and then read off cipher row by row

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enigma Machine

pg.248

A

essentially a typewriter that implemented a multi-alphabet substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steganography

pg.248

A

the process of hiding a message in a medium such as a digital image, audio file, or other file. Doing this prevents analyst from detecting the real message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric algorithms

pg.249

A

requires both ends of an encrypted message to have the same key and processing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric key

pg.249

A

referred to a secret key or a private key, that is disclosed to people who aren’t authorized to use the encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block cipher

pg.250

A

The algorithm works on chunks of data- encrypting on eo and then moving to the next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stream cipher

pg.250

A

the data is encrypted one bit or byte at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Encryption Standard

pg.250

A

used since the mid 70’s, it was primary standard used int he government and the industry until it was replaced by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Triple-DES

pg.250

A

technology upgrade of DES, still used even tho AES is preferred choice for government aplications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Encryption Standard

pg.50

A

has replaced DES as the current standard and uses the Rijnael algorithm

17
Q

AES256

pg.250

A

uses 256 bits instead of 128. This qualifies for US government classification as Top Secret

18
Q

Cast

pg.250

A

is an algorithm developed by Carlisle Adams and Stafford Tavares. still used in some products offered by MIcrosoft and IBM

19
Q

Ron’s Cast

pg.250

A

is an encryption family produced by RSA labs. uses keys size of up to 2048 considered to be a strong system

20
Q

Blowfish and Twofish

pg.251

A

an encryption system invented by a team led by Bruce Schneier that performs a 64-block cipher at very fast speeds. Twofish uses a 128 block

21
Q

International Data Encryption Algorithm

pg.251

A

IDEA was developed by a Swiss consortium. Its an algorithmt hat uses a 128 bit key

22
Q

One -time Pads

pg.251

A

are the only truly completely secure crptographic implementations. secure for two reasons. They use a key that is as long as a text message. That means there isnt a pattern in the key application for an attacker to use

23
Q

Key Exchange

pg.251

A

in band key exchange and out of key exchange. In band essentially means that the key is exchanged in the same communications