Section 24 Cryptography Flashcards
The practice and study of writing and solving codes in order to hide the true meaning of information.
Cryptography
Process of converting ordinary information (plaintext) into an unintelligible form (ciphertext).
Encryption
Inactive data that is archived, such as data resident on a hard disk drive.
Data at Rest
Data crossing the network or data that resides in a computer’s memory.
Data in Transit
Data that is undergoing constant change.
Data in Use
The essential piece of information that determines the output of a cipher.
Key
Encryption algorithm in which both the sender and the receiver must know the same secret using a privately held key.
Symmetric Encryption (Private Key)
Encryption algorithm where different keys are used to encrypt and decrypt the data.
Asymmetric Encryption (Public Key)
Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption.
Hybrid Implementation
Utilizes a keystream generator to encrypt data bit by using a mathematical XOR function to create the ciphertext.
Stream Cipher
Breaks the input into fixed length blocks of data and performs the encryption on each block.
Block Cipher
Encryption algorithm which breaks the input into 64 bit blocks and uses transportation and substitution to create ciphertext using an effective key strength of only 56 bits.
Data Encryption Standard (DES)
Encryption algorithm which sues three separate symmetric keys to encrypt, symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES.
Triple DES (3 DES)
Symmetric block cipher which uses 64 bit to encrypt plaintext into ciphertext.
International Data Encryption Algorithm (IDEA)
Symmetric block cipher that uses 128 bit, 192 bit, or 256 bit blocks and a matching encryption key size to encrypt plain text into ciphertext.
Advanced Encryption Standard (AES)
Symmetric block cipher that uses 64 bit blocks and a variable length encryption key to encrypt plaintext into ciphertext.
Blowfish
Symmetric block cipher that replaced blowfish and uses 128 bit blocks and a 128 bit, 192 bit, or 256 bit encryption key to encrypt plaintext into ciphertext.
Twofish
Symmetric stream cipher using a variable key size from 40 bits to 2048 bits that is used in SSL and WEP.
Rivest Cipher (RC 4)
Symmetric block cipher with a key sizes up to 2048 bits.
Rivest Cipher (RC 5)
Symmetric block cipher that was introduced as a replacement for DES but AES was chosen instead.
Rivest Cipher (RC 6)
- Confidentiality
- Authentication
- Integrity
- Non-Repudiation
Public Key Cryptography Provides
A hash digest of a message encrypted with the senders private key to let the recipient know the document was created and sent by the person claiming to have sent it.
Digital Signature
Used to conduct key exchanges and secure key distribution over an unsecured network.
Diffie-Hellman (DH)
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers.
RSA (Rivest, Shamir, and Adleman)
Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys.
Elliptic Curve Cryptography (ECC)
An encryption program used for signing, encrypting, and decrypting emails.
Pretty Good Privacy (PGP)
A newer and updated version of the PGP encryption suite that uses AES for it’s symmetric encryption functions.
GNU Privacy Guard (GPG)
Refers to how an organizations will generate, exchange, store, and use encryption keys.
Key Management
A stream cipher that encrypts plaintext information with a secret random key that is the same length as the plaintext input.
One Time Pad
A simulated random number stream generated by a computer that is used in cryptography, video games, and more.
Pseudo Random Number Generator (PRNG)
The science and art of hiding messages within other messages.
Steganography
A shared, immutable ledger for recording transactions, tracking assets and building trust.
Blockchain
A record keeping system that maintains participants identities in secure and anonymous form, their respective cryptocurrency balances, and a record book of all the genuine transactions executed between network participants.
Public Ledger
A computer that uses quantum mechanics generate and manipulate quantum bits (qubits) in order to access enormous processing powers.
Quantum Computing
A communications network that relies on qubits made of photons (lights) to send multiple combinations of ls and Os simultaneously which results in tamper resistant and extremely fast communications.
Quantum Communication
A quantum bit compromised of electrons or photons that can represent numerous combinations of ls and Os at the same time through superposition.
Qubit
A cryptographic key that is generated for each execution of a key establishment process.
Epherneral
An encryption method that allows calculations and be performed on data without decrypting it first.
Homomorphic Encryption