Cryptography Flashcards

1
Q

Modular Math

A

Lies behind much of cryptography.

Simply put, Modular Math shows you what remains (the remainder).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Caesar Cipher

A

A monoalphabetic rotation cipher used by Gaius Julius Caesar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transposition Ciphers

A

Use an encryption algorithm to rearrange letters of a plaintext message, forming the ciphertext message. The decryption algorithm simply reverses the encryption transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Substitution Ciphers

A

Use the encryption algorithm to replace each character or bit of the plaintext message with a different character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One-Time Pads

A

An extremely powerful type of substitution cipher. One-Time pads use a different substitution alphabet for each letter of the plaintext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Running Key Ciphers

A

In this cipher, the encryption cipher is as long as the message itself and is often chosen from a common book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block Ciphers

A

Operates on “chunks” or blocks, of message and apply encryption to an entire message block at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream Ciphers

A

Operates on one character or bit of a message (or data stream) at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confusion

A

Occurs when the relationship between the plaintext and the key is so complicated that an attacker cannot merely continue altering the plaintext and and analyzing the resulting ciphertext to determine the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffusion

A

Occurs when a change in plaintext results in multiple changes spread throughout the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Encryption Standard

A

64-bit block cipher
56-bit key
Long series of XOR operations
16 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DES Modes

A
Electronic Codebook Mode
Cipher Block Chaining Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly