Cryptography Flashcards
The practice and study of writing and solving codes in order to hide the
true meaning of information
Cryptography
Process of converting ordinary information (plaintext) into an
unintelligible form (ciphertext)
Encryption
Inactive data that is archived, such as data resident
on a hard disk drive
Data at Rest
Data crossing the network or data that resides in a
computer’s memory
Data in Transit
Data that is undergoing constant change
Data in Use
The essential piece of information that determines
the output of a cipher
Key
Encryption algorithm in which both the sender and the receiver must
know the same secret using a privately-held key
Symmetric Algorithm (Private Key)
DES, 3DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6
Symmetric Algorithm
Encryption algorithm where different keys are used to encrypt and
decrypt the data
Asymmetric Encryption (Public Key)
Utilizes asymmetric encryption to securely transfer a private key that can
then be used with symmetric encryption
Hybrid Implementation
Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext
Stream Cipher
Breaks the input into fixed-length blocks of data and performs the
encryption on each block
Block Cipher
Encryption algorithm which breaks the input into 64-bit blocks and uses
transposition and substitution to create ciphertext using an effective key
strength of only 56-bits
Data Encryption Standard (DES)
Encryption algorithm which uses three separate symmetric keys to
encrypt, decrypt, then encrypt the plaintext into ciphertext in order to
increase the strength of DES
Triple DES(3DES)
Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into
ciphertext
International Data Encryption Algorithm (IDEA)
Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a
matching encryption key size to encrypt plaintext into ciphertext
Advanced Encryption Standard (AES)