Lecture 09 - Cryptography Flashcards
Cryptography
process of hiding information so that only the person a message was intended for can read it
Encryption
Scrambling data to be readable only by intended recipients
Steganography
Hiding the existence of a message
Cryptanalysis
Process of breaking cryptography
Shift Cipher
Substitution cipher shifting letters by a fixed number
One-Time Pad
Encrypting each letter uniquely with a random key
Pseudo Random Number Generator
Algorithm that generates sequences of numbers that appear random but are determined by a fixed initial value.
Stream Ciphers
Using pseudo-random generators for encryption
Block Ciphers
Encrypt data in blocks
Perfect Secrecy
no computational power can guess or obtain any information about the plain text or secret keys
Cryptographic Hash Function
Maps messages to fixed-size output
Data Encryption Standard (DES)
Encrypts Plaintext by breaking it down into smaller parts and using a cryptographic key to decrypt it
Advanced Encryption Standard (AES)
widely used symmetric encryption algorithm for securing data online
Message Authentication Code (MAC)
Short piece of information used for authenticating and integrity-checking a message
RSA Algorithm
widely used asymmetric encryption algorithm for secure communication and digital signatures