encoding/stenography/RNG Flashcards

1
Q
  • periodic (repeatable sets)
  • fast
  • deterministic (predictable sets)
A

Pseudo-Random Number Generators (PRNGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • aperiodic
  • slow
  • Non-deterministic
A

True Random Number Generators (TRNGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

8-bit values, up to 256 characters

A

ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

16- bit values, up to 65,536 characters

A

UTF-16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secret Key encryption is needed for…

A

symmetric cryptography; makes use of a single secret key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What specific algorithm is used in asymmetric cryptography overcome the weakness of symmetric cryptography through secret key encryption?

A

Diffie-Hellman is a widely used key exchange algorithm used to exchange the secret key in symmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aescrypt

A

encrypts individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bitlocker

A

encrypts full disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FileVault

A

encrypts full disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pseudo-Random Number Generators (PRNGs)

A
  • periodic repeats the random numbers after a given time

* They are fast deterministic and are useful in producing a repeatable set of random numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True Random Number Generators (TRNGs)

A

•This method generates a true random number and uses some form of random
process.
•Overall, the method is generally slow, but is non-deterministic and aperiodic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Poly-alphabetic cipher
  • Like multiple Caesars
  • based on a keyword
  • difficult to guess
A

Vigenere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Encrypts two letters instead of one, this makes it more complex.
  • 5x5 table
  • based on a keyword and rule set
  • Removes repeating letters
A

Playfair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Mono-alphabetic substitution cipher
  • maps plaintext characters to symbols rather than to letters
  • 2 square grids, 2 X-shaped grids, dots.
  • Easy to remember
A

Pigpen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Makes use of a grid

* maps the letters into numeric values.

A

BIFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Transposition cipher
  • encrypts the message by altering each letter on a different row
  • message must then be written down left to right and put into rows
A

Rail Fence (Zig-Zag)

17
Q
  • mitigates frequency analysis
  • mono-alphabetic
  • mappings depend number of occurrences for a letter
A

homophonic substitution code

18
Q
  • Can optionally use four 5x5 matrices arranged in square
  • 25 letters
  • bigrams.
  • Maps to numbers
A

Four-square Cipher

extension of BIFID?

19
Q
  • poly-alphabetic
  • substitution cipher
  • secret key
  • letters could not be ciphered as itself.
A

Enigma Machine

20
Q
  • substitution cipher
  • maps letters to numbers
  • Uses mod math algorithm
A

Affine Cipher

21
Q
  • transposition cipher
  • 36 letter alphabet
  • Polybius square
  • single columnar
A

ADFVGX Cipher

22
Q
  • poly-Alphabet

* Turning produced different ciphertexts.

A

Cipher Disk

23
Q

Examples of poly-alphabetic ciphers

A

Vigenere
Cipher disk
Enigma machine