Week 04 Flashcards
Plaintext
Plaintext
Readable data or text before it is encrypted into ciphertext.
Frequency Analysis
Frequency Analysis
A method of breaking ciphers by studying the frequency of letters or groups of letters in ciphertext.
Cryptanalysis
Cryptanalysis
The study and practice of breaking cryptographic codes and understanding weaknesses in encryption methods.
Out-of-band
Out-of-band
A communication method where encryption keys or information are shared via a separate channel from the primary data stream.
Key
Key
A value used in cryptographic algorithms to encrypt and decrypt data, created using specific algorithms.
Substitution/Transposition Cipher
Substitution/Transposition Cipher
Ciphers that replace elements of the plaintext with other symbols (substitution) or rearrange their order (transposition).
Algorithm
Algorithm
A set of mathematical rules or instructions for performing encryption, decryption, or data processing.
Block Mode Encryption
Block Mode Encryption
An encryption method that processes fixed-size blocks of data at a time rather than one bit or byte at a time.
Ciphertext
Ciphertext
Encrypted data that is not readable until it has been decrypted back into plaintext.
Key Pair
Key Pair
A pair of keys (public and private) used in asymmetric encryption, where one key encrypts data and the other decrypts it.
Message Digest
Message Digest
A fixed-size numerical representation (hash) of a message, used for verifying data integrity.
Private Key & Public Key
Private Key & Public Key
In asymmetric encryption, the public key is used for encryption and shared openly, while the private key is kept secret and used for decryption.
Non-Repudiation
Non-Repudiation
Assurance that someone cannot deny the authenticity of their signature or message.
RNG (Random Number Generator)
RNG (Random Number Generator)
A device or algorithm that generates random numbers, crucial for cryptographic key generation.
In-Band
In-Band
A method where encryption keys or information are shared within the same channel as the primary data stream.
Key Escrow
Key Escrow
A method where encryption keys are held in a secure third-party location for access if needed.
Encoding and Encryption
Encoding and Encryption
Encoding converts data for easy readability or storage, while encryption converts data to secure it against unauthorized access.
Key Space
Key Space
The total range of possible values for a cryptographic key.
Decoding and Decryption
Decoding and Decryption
Decoding reverses encoding, making data readable again, while decryption reverses encryption to reveal plaintext.
Cryptography
Cryptography
The science of securing information through encryption and other techniques.
Hashes and Hash Function
Hashes and Hash Function
A hash function generates a fixed-size output (hash) from input data, used for verifying data integrity.
Collision
Collision
When two different inputs produce the same hash output, undermining the effectiveness of a hash function.
Symmetric/Asymmetric Encryption
Symmetric/Asymmetric Encryption
Symmetric encryption uses one key for both encryption and decryption, while asymmetric encryption uses a pair of keys (public and private).
CPTED (Crime Prevention Through Environmental Design)
CPTED (Crime Prevention Through Environmental Design)
A strategy to deter criminal behavior through environmental design and layout.
Session Key
Session Key
A temporary key used to encrypt data during a communication session, ensuring secure communication.