Cryptography Flashcards

1
Q

Algorithm

A

A computing procedure designed to perform a task such as encryption, decryption, compression, or hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate

A

A digitally signed, special block of data that contains a public key and the identifying information for the entity, or principal, that owns the associated private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certificate Authority (CA)

A

A trusted entity or third party that issues and signs public key certificates, thereby attesting to the validity of the public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext/ Cryptogram

A

This is the enciphered, encrypted, or scrambled form of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collisions

A

Where two different messages would provide the same hash or digest value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis

A

The practice of defeating the protective properties of cryptography. Reading protected information, altering messages or integrity values, and violating authentication schemes are all forms of cryptanalysis. The practice of testing cryptographic algorithms to determine their strength or resistance to compromise is also a form of cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptography

A

The word cryptography is based on the Greek words “kryptos” (hidden) and “grafi” (writing). It is a mathematical manipulation of information that prevents the information from being disclosed or altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptology

A

The study of cryptography and cryptanalysis,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalysis

A

The practice of defeating the protective properties of cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptovariable (key)

A

The (often-secret) value used in the transformation of the message in a cryptographic operation that controls the operation of the algorithm in a unique, predictable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decipher/ decrypt/ decode

A

Descrambling an encrypted message and converting it into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Signature

A

Proves that the message has not been altered (Message Integrity), and it proves who sent the message (Proof of Origin and non-repudiation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic Code Book (ECB)

A

Each block of plaintext is independently encrypted into a respective block of ciphertext. This can be down in parallel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encrypt/ encipher

A

Scrambling a plaintext message by using an algorithm, usually in conjunction with a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exclusive-OR (XOR)

A

A basic transformation technique and another name for binary addition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash Functions

A

Used to ensure message integrity. For example, when a message is sent over a communications channel, it may be altered either accidentally or intentionally while in transit.

17
Q

Initialization Vector (IV)

A

A random value that is XOR’d with the plaintext message before encryption.

18
Q

Kerckhoff’s Principle

A

States that the strength cryptosystem is based on the secrecy of the key and not on the secrecy of the algorithm.

19
Q

Key Clustering

A

A weakness that would exist in a cryptosystem if two different keys would generate the same ciphertext from the same plaintext.

20
Q

Key space

A

The total number of keys available to the user of a cryptosystem.

21
Q

Non-repudiation

A

A security service by which evidence is maintained so that the sender and recipient of data cannot deny having participated in the communication. Referred to individually as non-repudiation of origin and non-repudiation of receipt.

22
Q

Plaintext/ Cleartext

A

This is the natural or human-readable form of a message.

23
Q

Registration Authority (RA)

A

The primary organization that verifies a certificate Applicant’s information and identity.

24
Q

Scytale Rod

A

A simple transposition cipher system that employs a rod of a certain thickness around which was wrapped a long, thin strip of parchment.

25
Q

Secure HTTP (S-HTTP)

A

A protocol for transmitting data securely over the World Wide Web designed to transmit individual messages securely.

26
Q

Secure Sockets Layer (SSL/TLS)

A

Uses two keys to encrypt data: a public key known to everyone and a private or secret key known only to the recipient of the message.

27
Q

Synchronous and Self-synchronous

A

An algorithm in which the keystream is generated based on the original key, bit-by-bit, in sync with the arrival of the plaintext.

28
Q

Transport Layer Security (TLS)

A

A protocol that guarantees privacy and data integrity between client/ server applications communicating over the Internet.

29
Q

Work Factor

A

An estimate of the effort/ time needed to overcome a protective measure by an attacker with specified expertise and resources.