Encryption Flashcards

1
Q

What is encryption

A

Using an algorithm to change data so it can only be read by the intended receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is decryption

A

Turning the encrypted data back into data that can be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cipher

A

The algorithm which is used to encrypt or decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is plaintext

A

The unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ciphertext

A

The encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the key(encryption)

A

Data which define how the plaintext was encrypted and how to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption

A

The same key is used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asymmetric encryption

A

Different keys are used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Caesar cipher

A

Type of substitution cipher
Replaces plaintext letters with a different one a fixed number of places down the alphabet
Uses symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name a disadvantage of using the Ceasar cipher for encryption

A

Word Structure is preserved
Letter frequency is unchanged - making it easier to find the cipher
quick to crack using brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Vernam Cipher

A

Uses randomly generated one time binary key that is
- Same length as plaintext
- XORed with plaintext to produce ciphertext
- Decrypted in the same way with the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name an advantage and disadvantage of using the Vernam Cipher for encryption

A

Adv
- No two bites are encoded with the same mapping
- Mathematically secure

Dis
- Keys are very large

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Computation Security/Hardness

A

Refers to how difficult a cipher is to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is perfect security

A

The cipher is impossible to crack in a reasonable amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly