Chapter 8 Cryptography Flashcards
Cryptography
Pg.245
The science of altering information so that it cannot be decoded without a key.
Cipher
pg.245
a method used to encode characters to hide their value
Substitution Ciphers
pg.246
a type of coding or ciphering system that changes one character or symbol into another
Ceasar Cipher
pg.246
oldest known substitution ciphers known for shifting all letters a certain number
Vigenere cipher
pg.246
uses keyword to look up the cipher text in a table
Transposition cipher
pg.246
involves transposing or scrambling the letters in a certain manner
Rail Fence Cipher
pg.247
the message letters out diagonally over a number or rows and then read off cipher row by row
Enigma Machine
pg.248
essentially a typewriter that implemented a multi-alphabet substitution cipher
Steganography
pg.248
the process of hiding a message in a medium such as a digital image, audio file, or other file. Doing this prevents analyst from detecting the real message.
Symmetric algorithms
pg.249
requires both ends of an encrypted message to have the same key and processing algorithms
Symmetric key
pg.249
referred to a secret key or a private key, that is disclosed to people who aren’t authorized to use the encryption system
Block cipher
pg.250
The algorithm works on chunks of data- encrypting on eo and then moving to the next
Stream cipher
pg.250
the data is encrypted one bit or byte at a time
Data Encryption Standard
pg.250
used since the mid 70’s, it was primary standard used int he government and the industry until it was replaced by AES
Triple-DES
pg.250
technology upgrade of DES, still used even tho AES is preferred choice for government aplications