Lecture 09 - Cryptography Flashcards

1
Q

Cryptography

A

process of hiding information so that only the person a message was intended for can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Scrambling data to be readable only by intended recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Steganography

A

Hiding the existence of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptanalysis

A

Process of breaking cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shift Cipher

A

Substitution cipher shifting letters by a fixed number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One-Time Pad

A

Encrypting each letter uniquely with a random key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pseudo Random Number Generator

A

Algorithm that generates sequences of numbers that appear random but are determined by a fixed initial value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream Ciphers

A

Using pseudo-random generators for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Block Ciphers

A

Encrypt data in blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perfect Secrecy

A

no computational power can guess or obtain any information about the plain text or secret keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic Hash Function

A

Maps messages to fixed-size output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Encryption Standard (DES)

A

Encrypts Plaintext by breaking it down into smaller parts and using a cryptographic key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advanced Encryption Standard (AES)

A

widely used symmetric encryption algorithm for securing data online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Message Authentication Code (MAC)

A

Short piece of information used for authenticating and integrity-checking a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RSA Algorithm

A

widely used asymmetric encryption algorithm for secure communication and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly