Cryptography Concepts Flashcards

1
Q

Define Synchronous Encryption

A

encryption / decryption occurs immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Asynchronous Encryption

A

encryption / decryption requests are processed from a queue. A delay can take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Symmetric Encryption

A

same key used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Asymmetric Encryption

A

One private key and one public key perform encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Digital Signature

A

method of providing sender authentication and message integrity.

message acts as input to hash function

sender’s private key encrypts the hash value

hash computation on received message determines validity of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define hash

A

one way function that reduces message to a hash value

Comparison of sender’s hash value to receiver’s hash value determines message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ciphertext

A

altered form of message that is unreadable without knowing the key and encryption system used

aka cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define cryptosystem

A

components that make encryption possible:

algorithm
key
key management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define cryptanalysis

A

science of decrypting ciphertext without prior knowledge of the key or crypto system used

aka breaking encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define key clustering

A

Occurs when different encryption keys generate same ciphertext from same plaintext message

considered a weakness of an algorithm if they occur frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define keyspace

A

all possible key values when using particular algorithm or other security measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define collision

A

when a hash function produces same hash value on different messages

considered a weakness of an algorithm if they occur frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define algorithm

A

mathematical function that encrypts and decrypts data

aka a cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define cryptology

A

science that studies encrypted communications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Encoding

A

process of changing data into another form using code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Transposition

A

process of shuffling or reordering the plaintext to hide the original message

aka permutation

17
Q

Define Substitution

A

process of exchanging 1 byte in a message for another

18
Q

Define Confusion

A

process of changing a key value during each round of encryption

confusion is often carried about by substitution

19
Q

Define Diffusion

A

process of changing location of the plaintext within the cypher text

often carried out during transposition

20
Q

Define Avalanche Effect

A

Condition in which any change in the key or plaintext no matter how minor significantly changes the ciphertext

21
Q

Define Work Factor

A

Amount of time and resources needed to break encryption

22
Q

Define one-way function

A

mathematical function that can be more easily performed in one direction than the other

23
Q

Define Trapdoor

A

secret mechanism that allows the implementation of the reverse function in a one-way function

24
Q

Cryptographic Life Cycle

A

implementation

maintenance

retirement / replacement