Section 3 Flashcards
What is encryption
the process of transforming readable data, called plaintext or cleartext, into an unreadable form, called ciphertext.
What is decryption
the process of recovering the plaintext message from the ciphertext.
What are keys used for in cryptography
to encrypt or decrypt a message
What is a substitution cipher
substitutes each letter in the alphabet with a different one.
What is “security through obscurity”
secrecy surrounding the equipment and the configurations used for specific messages could provide good security
What is an important aspect of a cryptographic algorithm
cryptographic algorithms should be robust enough that even if people know every bit of the encryption process except for the key itself, they should still not be able to break the encryption.
What are “one-way problems”
are easy to perform in one direction but difficult to perform in the other direction.
What are keyword ciphers
Rather than shifting all letters by the same number of spaces in the alphabet, you’d shift each letter to match the corresponding letter in the keyword. a keyword alphabet is made with the keyword and appending the regular alphabet to the end without having 2 of the same letters
What is frequency analysis
means you can make guesses about what the message contents might be based on the frequency of characters used, where those characters appear in words, and when they’re repeated.
What is a one-time pad
where you get a paper with numbers and use those numbers to shift each character by the number specified to encrypt/decrypt a message
What is symmetric key cryptography
uses a single key to both encrypt the plaintext and decrypt the ciphertext.
What is a block cipher
takes a predetermined number of bits (or binary digits, which are either a 1 or a 0), known as a block, and encrypts that block. Blocks typically have 64 bits, but they can be larger or smaller depending on the algorithm used and the various modes the algorithm can operate in.
What is a stream cipher
encrypts each bit in the plaintext message one bit at a time. You can make a block cipher act as a stream cipher by setting the block size to one bit.
What are 3 common symmetric key algorithms and how do they work
DES - a block cipher that uses a 56-bit key (meaning the key used by its cryptographic algorithm is 56 bits long).
3DES - DES used to encrypt each block three times, with three different keys.
AES - a set of symmetric block ciphers. AES uses three different ciphers: one with a 128-bit key, one with a 192-bit key, and one with a 256-bit key, all of which encrypt blocks of 128 bits.
What is asymmetric key cryptography
also known as public key cryptography, uses two keys: a public key and a private key. You use the public key to encrypt data, and anyone can access the public key
What is asymmetric key cryptography
also known as public key cryptography, uses two keys: a public key and a private key. You use the public key to encrypt data, and anyone can access the public key. Private keys, used to decrypt messages, are carefully guarded by the receiver.