Encryption Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is encryption?

A

The process of turning plaintext into cyphertext, which can only be understood by decrypting again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is decryption?

A

The process of deciphering encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is plaintext?

A

Data that is in a form readable by humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ciphertext?

A

Data that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key?

A

The data that randomises the encryption of a string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain how a Caesar cipher works

A

Each letter is shifted forwards or backwards by a set amount, i.e. a shift of two to the right would result in all Zs being replaced by Bs, all As being replaced by Cs, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how a substitution cipher works

A

A random mapping of one character to another is created, and characters are replaced according to this mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how a polyalphabetic cipher works

A

It is similar to a substitution cipher, except it is passed through multiple different mappings. For example, an A may become an M according to the first mapping, and this M may become a G according to the second mapping, etc. As such, all mappings are required to decrypt the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is frequency analysis?

A

The study of how often different characters are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are substitution ciphers considered weak?

A

Frequency analysis can be performed to make educated guesses about what each character decodes to, i.e. the most frequent character is most likely to be an E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a transposition cipher?

A

A cipher that arranges the plaintext characters in some pattern and then reads this in such a way that the letters are jumbled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain how a rail fence cipher works

A

The plaintext is written downwards and diagonally on successive “rails” of an imaginary fence, returning to the top when the bottom rail is reached. The message is then read off in rows. For example, “example” may have a top row of “eme”, a second row of “xp”, and a third row of “al”, making the ciphertext “emexpal”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain how a route cipher works

A

The plaintext is put into a grid, then read off in a pattern given in the key, i.e. “spiral inwards, clockwise, starting from the top right”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a one time pad?

A

A key that is only used to encrypt and decrypt a message once, before being discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how a Vernam cipher works

A

A one time pad which is as long as the plaintext is used. Each character in both the plaintext and the key is converted to a binary value (i.e. using ASCII), and then a logical XOR is used on these binary representations to produce a new binary code, which maps back to different characters. To decrypt the ciphertext, an XOR is used again on the binary representations of the ciphertext and the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is the Vernam cipher the only cipher to be completely secure?

A

Since the key is chosen uniformly at random, the ciphertext is also distributed uniformly, and as such frequency analysis is impossible