Week 04 Flashcards

1
Q

Plaintext

Plaintext

A

Readable data or text before it is encrypted into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Analysis

Frequency Analysis

A

A method of breaking ciphers by studying the frequency of letters or groups of letters in ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis

Cryptanalysis

A

The study and practice of breaking cryptographic codes and understanding weaknesses in encryption methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Out-of-band

Out-of-band

A

A communication method where encryption keys or information are shared via a separate channel from the primary data stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key

Key

A

A value used in cryptographic algorithms to encrypt and decrypt data, created using specific algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Substitution/Transposition Cipher

Substitution/Transposition Cipher

A

Ciphers that replace elements of the plaintext with other symbols (substitution) or rearrange their order (transposition).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Algorithm

Algorithm

A

A set of mathematical rules or instructions for performing encryption, decryption, or data processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Mode Encryption

Block Mode Encryption

A

An encryption method that processes fixed-size blocks of data at a time rather than one bit or byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ciphertext

Ciphertext

A

Encrypted data that is not readable until it has been decrypted back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Pair

Key Pair

A

A pair of keys (public and private) used in asymmetric encryption, where one key encrypts data and the other decrypts it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Message Digest

Message Digest

A

A fixed-size numerical representation (hash) of a message, used for verifying data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private Key & Public Key

Private Key & Public Key

A

In asymmetric encryption, the public key is used for encryption and shared openly, while the private key is kept secret and used for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-Repudiation

Non-Repudiation

A

Assurance that someone cannot deny the authenticity of their signature or message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RNG (Random Number Generator)

RNG (Random Number Generator)

A

A device or algorithm that generates random numbers, crucial for cryptographic key generation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In-Band

In-Band

A

A method where encryption keys or information are shared within the same channel as the primary data stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Escrow

Key Escrow

A

A method where encryption keys are held in a secure third-party location for access if needed.

15
Q
A
16
Q

Encoding and Encryption

Encoding and Encryption

A

Encoding converts data for easy readability or storage, while encryption converts data to secure it against unauthorized access.

16
Q

Key Space

Key Space

A

The total range of possible values for a cryptographic key.

16
Q

Decoding and Decryption

Decoding and Decryption

A

Decoding reverses encoding, making data readable again, while decryption reverses encryption to reveal plaintext.

17
Q

Cryptography

Cryptography

A

The science of securing information through encryption and other techniques.

18
Q

Hashes and Hash Function

Hashes and Hash Function

A

A hash function generates a fixed-size output (hash) from input data, used for verifying data integrity.

19
Q

Collision

Collision

A

When two different inputs produce the same hash output, undermining the effectiveness of a hash function.

20
Q

Symmetric/Asymmetric Encryption

Symmetric/Asymmetric Encryption

A

Symmetric encryption uses one key for both encryption and decryption, while asymmetric encryption uses a pair of keys (public and private).

21
Q

CPTED (Crime Prevention Through Environmental Design)

CPTED (Crime Prevention Through Environmental Design)

A

A strategy to deter criminal behavior through environmental design and layout.

22
Q

Session Key

Session Key

A

A temporary key used to encrypt data during a communication session, ensuring secure communication.