Week 6 Flashcards
replaces bits, characters or blocks or characters with different bits characters or blocks
jpresuello
Substitution Cipher
does not replace text but rather moves the original values around
jpresuello
Transposition Cipher
encryption method that uses Caesars method but shifts the letter 13 spaces
jpresuello
ROT 13
Type of cipher used in Enigma Machine
jpresuello
polyalphabetic substitution cipher
random bits that will be used by the algorithm to specify how the plain text is converted
jpresuello
Keys
mathematical formulas that dictate the rules how plaintext will be turned to cipher text
jpresuello
Algorithms
work on blocks of bits
jpresuello
Block CIpher
work on bits one byte at a time
jpresuello
Stream Ciphers
The first block cipher Introduced mathematical equations and functions introduced by IBM
jpresuello
Lucifer
science of studying and breaking the secrecy of encryption processes
jpresuello
Cryptanalysis
method of transforming readable data, called plaintext into a form that appears to be random and unreadable, which is called cipher text
jpresuello
Encryption
Any system or product that provides encryption and decryption service
jpresuello
Cryptosystem
hybrid system of symmetric and asymmetric key algorithms
jpresuello
PKI
Trusted organization that maintains and issues digital certificates.
jpresuello
Certificate Authority
a method of storing and transmitting data in a form that only those it is intended for can read and process.
jpresuello
Cryptography
5 Block Cipher Modes
jpresuello
Electronic Codebook, Cipher Block Chaining, Cipher Feedback, Output Feedback, Counter
_____ carried out through substitution
jpresuello
Confusion
_ carried out through transposition
jpresuello
Diffusion
Does cryptosystem use keys?
jpresuello
Yes
Symmetric Encryption provides?
jpresuello
confidentiality
Asymmetric encryption provides?
jpresuello
authentication and confidentiality
True of False? Media files are ideal for steganography because of large file size?
jpresuello
True
DES stands for
jpresuello
Data Encryption Standard
How many bits is AES
jpresuello
128
True or False: Diffie-Hellman is vulnerable to man in the middle attack?
jpresuello
True
Why is Diffie-Hellman vulnerable to man in the middle attack?
jpresuello
No AUTHENTICATION prior to sending public keys