Week 06 Flashcards

1
Q

Scytale Cipher

Scytale Cipher

A

A transposition cipher where a strip of text is wound around a rod, and the message is read by re-wrapping it around a rod of the same diameter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vigenere Cipher

Vigenere Cipher

A

A polyalphabetic substitution cipher that uses a keyword to shift letters in the plaintext, making it more secure by using multiple Caesar shifts throughout the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

polyalphabetic substitution cipher

polyalphabetic substitution cipher

A

A polyalphabetic substitution cipher uses multiple substitution alphabets to encrypt a message, changing the letter mappings throughout the text to make it more resistant to frequency analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

frequency analysis

frequency analysis

A

Frequency analysis is a cryptanalysis technique that studies the frequency of letters or groups of letters in a ciphertext to identify patterns and decipher the encrypted message, exploiting the natural frequency of letters in a language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

block cipher vs stream cipher

block cipher vs stream cipher

A

A block cipher encrypts data in fixed-size blocks (e.g., 128 bits) and processes one block at a time, while a stream cipher encrypts data one bit or byte at a time, making it more suitable for real-time encryption where data size varies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

keystream generators

keystream generators

A

Keystream generators produce a sequence of pseudorandom bits (keystream) used in stream ciphers to combine with plaintext, typically using XOR, to create ciphertext and ensure secure encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 Block Cipher Modes

5 Block Cipher Modes

A
  1. Electronic Codebook
  2. Cipher Block Chaining (CBC)
  3. Cipher Feedback (CFB)
  4. Output Feedback (OFB)
  5. Counter (CTR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block cipher attributes

Block cipher attributes

A

Confusion
*Carried out through substitution
2. Diffusion
*Carried out through transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vernam Cipher

Vernam Cipher

A

The Vernam Cipher, also known as the One-Time Pad, is a stream cipher where each bit or character of the plaintext is XORed with a random key of the same length, providing theoretically unbreakable encryption if the key is truly random, used only once, and kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Running Key Cipher

Running Key Cipher

A

The running key cipher is a polygraphic substitution cipher that encrypts a plaintext message by shifting each letter according to the corresponding letter of a long key text, making it as secure as the randomness and length of the key allow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly