Cryptography Flashcards

1
Q

Plaintext or Cleartext

A

Original message, readable by attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphertext or Cryptogram

A

Altered message that is unreadable to anyone except the intended recipients, unreadable by attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

Process of converting plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decryption

A

Going from ciphertext to plaintext using the cryptographic algorithm and the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Algorithm

A

Mathematical function used in the encryption and decryption process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key or Cryptovariable

A

Sequence that controls the operation of the cryptographic algorithm, determines behavior of algorithm and permits reliable encryption and decryption of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nonrepudiation

A

Security service by which evidence is maintained so that the sender and the receiver of data cannot deny having participated in the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptosystem

A

Entire cryptographic operation (including algorithm, key, and key management functions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalysis

A

Study of techniques for defeating cryptographic techniques and by extension security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptology

A

Science that deals with hidden, disguised or encrypted communications
Includes communications security and communications intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Collision

A

Occurs when a hash function generates the same output for different inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Space

A

Total number of possible values of keys in a cryptographic algorithm or other security mechanism
2^n (n=length of key in bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Work Factor

A

Time and effort required to break a protective measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Initialization Vector (IV)

A

Non-secret binary vector (block of bits) used as the initializing input for the encryption of a plaintext sequence
Increases security by introducing additional cryptographic variance to create unique ciphertext using the same key
Must be known to the recipient to decrypt message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encoding and Decoding

A

Encoding: action of changing a message to another format through the use of a code (i.e. message to Morse)
Decoding: converting encoded message into plaintext
*Has nothing to do with encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transposition or Permutation

A

Reordering plaintext to hide the message

17
Q

Substitution

A

Process of exchanging one letter (or byte) for another

18
Q

SP-Network

A

Substitution and Permutation

Adds confusion and diffusion to the process

19
Q

Confusion

A

Provided by mixing/changing key values used during the repeated rounds of encryption

20
Q

Diffusion

A

Mixing up the location of the plaintext throughout the ciphertext
Location of first character of plaintext may change several times during the encryption process due to transposition

21
Q

Avalanche Effect

A

Designing algorithms where a minor change in either the key or the plaintext will have a significant change in the resulting ciphertext
Confusion and diffusion
Strong hashing algorithm

22
Q

Link Encryption

A

Encrypts all data along communications path (including router information which provides traffic confidentiality)

23
Q

End-to-End Encryption

A

Data is encrypted in the beginning and is not decrypted until it reaches the end
Usually performed by end-user
Routing information remains visible