Cryptology and Different Cipher Methods Flashcards

1
Q

The process of making and using codes to secure the transmission of information

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of obtaining the original message from an encrypted message without knowing the algorithms and keys used to perform the encryption

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of converting an original message into a form that is unreadable to unauthorized individuals

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of converting the cyphertext back into plaintext so that it can be understood

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The programmatic steps used to convert unencrypted message into an encrypted sequence of bits that represent the message

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), a procedure used to perform encryption and decryption

A

Cipher or cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The encoded message resulting from an encryption

A

Ciphertext or cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of converting components (words or phrases) of an encrypted message into encrypted components

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To decrypt

A

Decipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To encrypt

A

Encipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext

A

Key or cryptovariable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The entire range of values that can be used to construct an individual key

A

Keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A series of encryptions and decryptions between a number of systems

A

Link encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The hiding of messages

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown

A

Work factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two methods of encryption plaintext

A
  1. Bit Stream Method
  2. Block Cipher Method
17
Q

Commonly used algorithm functions is the exclusive OR (XOR) operation

A

Bit Stream Method

18
Q

Use substitution, transposition, XOR, or some combination of these

A

Block Cipher Method

19
Q

You substitute one value for another — for example, a letter in the alphabet with the letter three values to the right

A

Substitution Cipher

20
Q

Replace a character/s with a different character/s based upon some key

A

Monoalphabetic substitution-based ciphers

21
Q

Similar to monoalphabetic ciphers, except multiple alphabetic strings are used

A

Polyalphabetic Ciphers

22
Q

A matrix of 26x26 alphabetic characters — used in encoding simple polyalphabetic ciphers

A

Polyalphabetic Ciphers

23
Q

Also known as permutation cipher, it simply arranges the values within a block to create the ciphertext

A

Transposition Cipher

24
Q

Also known as one-time pad cipher developed by AT&T, uses a set of characters only one time for each encryption process

A

Vernam cipher

25
Q

The process of keeping a computer number within a specific range is called ____________

26
Q

Algorithm is the mechanical process of looking the reference from the ciphertext and converting each reference to a work by using the ciphertext’s value and the key (the book)

A

Book or Running Key Cipher

27
Q

Mathematical algorithms that generate a message summary or digest (sometimes called fingerprint) to confirm the identity of a specific message and to confirm that there have not been any changes to the content

A

Hash functions

28
Q

Hash functions confirm message ____________ and ____________

A

identity… integrity

29
Q

Hash algorithms are public functions that create a ____________ (message digest) by converting variable-length messages into a single fixed-length value

A

hash value

30
Q

The message digest is a ____________ or the author’s message that is compared with the recipient’s locally calculated hash of the message

A

fingerprint