Week 1 : Course Introduction Flashcards

1
Q

Cryptography

A

is a method of storing and transmitting data in a form that only those it is intended for can read and process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

A science of protecting information by encoding it into an unreadable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What i the ultimate goal of cryptography

A

The ultimate goal of cryptography is to hide information from unauthorized individuals,

A more realistic goal of cryptography is to make obtaining the information too work-intensive to be worth it to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Today’s transmission mechanism of encrypted message

A

packets carrying 0’s and 1’s passing through network cables or open airwaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is atbash

.

A

Encryption method requiring the alphabet to be flipped so that each letter in the original alphabet is mapped to a different letter in the flipped alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis

A

is a science of studying and breaking the secrecy of encryption algorithms and their necessary pieces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is encryption?

A

Encryption is a method of transforming original data, called plaintext or cleartext, into a form that appears to be random and unreadable, which is called ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is cryptosystem

A

A system that provides encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is keyspace

A

range of values that can be used to construct a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is work factor?

A

Is an estimate of the effort it would take an attacker to penetrate an encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can Cryptosystems provide

A

Cryptosystems can provide confidentiality, authenticity, integrity, and nonrepudiation services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

means that unauthorized parties cannot access information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authenticity

A

refers to validating the source of the message to ensure the sender is properly identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrity

A

provides assurance that the message was not modified during transmission, accidentally or intentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonrepudiation

A

means that a sender cannot deny sending the message at a later date, and the receiver cannot deny receiving it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptology

A

The study of both cryptography and cryptanalysis

17
Q

Ciphertext

A

Data in encrypted or unreadable format

18
Q

Encipher

A

Act of transforming data into an unreadable format

19
Q

Decipher

A

Act of transforming data into a readable format

20
Q

Key

A

Secret sequence of bits and instructions that governs the act of encryption and decryption

21
Q

Key clustering

A

Instance when two different keys generate the same ciphertext from the same plaintext

22
Q

Keyspace

A

Possible values used to construct keys

23
Q

Plaintext

A

Data in readable format, also referred to as cleartext

24
Q

Cryptography history

A

has roots that began around 2000 BC in Egypt when hieroglyphics were used to decorate tombs to tell the story of the life of the deceased.

25
Q

When was the first system of encrypting information

A

Around 400 BC, the Spartans used a system of encrypting information by writing a message on a sheet of papyrus, which was wrapped around a staff.

26
Q

Algorithm

A

Set of mathematical rules used in encryption and decryption

27
Q

Breaking a key

A

has to do with processing an amazing

number of possible values in the hopes of finding the one value that can be used to decrypt a specific message

28
Q

When was the first encryption?

A

Dated back to 4000 years ago

29
Q

what is a packet?

A

A transmission mechanism

30
Q

Root of Cryptography

A

Aroud 2000 DC

31
Q

The rotor cipher machine,

A

Called Enigma, device that substitutes letters using different rotors within the machine

32
Q

Who is the father of Cryptographie

A

William Friedman

33
Q

Clipper Chip

A

Encryption method developed by law enforcement

34
Q

The strength of the encryption method

A

comes from the algorithm, secrecy of the key,length of the key, initialization vectors, and how they all work together.

When strength is discussed in encryption, it refers to how hard it is to figure out the algorithm or key,
whichever is not made public.

35
Q

brute force attack,

A

means trying every possible key value until the resulting plaintext is meaningful.