Fundamentals of Information Security - D430 CH 5 (Actual Exam) Questions with verified Answers (Latest Update 2026) UPDATE!!-WGU

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:20 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

Cryptography

science of protecting the confidentiality & integrity of data & a key part of the vast set of transactions that take place over devices daily.

2
New cards

Encryption

process of transforming readable data, called platext or cleartext, to an unreadable form called ciphertext.

3
New cards

Decryption

process of recovering the plaintext from a ciphertext.

4
New cards

cryptographic algorithm

encrypting plaintext or decrypting the ciphertext through computational procedure. Use a key, or multiple keys, to encrypt or decrypt message.

5
New cards

The Caesar Cipher

ancient cryptography used by Julius Caesar. Involves shifting each letter of plaintext message by a certain number of spaces in alphabet, historically 3. After shift you would write letter A as D, letter B as E.. etc.

<p>ancient cryptography used by Julius Caesar. Involves shifting each letter of plaintext message by a certain number of spaces in alphabet, historically 3. After shift you would write letter A as D, letter B as E.. etc.</p>
6
New cards

Substitution cipher

encryption method that substitutes each letter in alphabet for a different one.

7
New cards

ROT13 cipher

same mechanism as caesar cipher but moves each letter 13 spaces forward in alphabet.

8
New cards

The Jefferson Disk

Invented by Thomas Jefferson in 1795, purely mechanical cryptography machine. composed of 36 disk, marked a-z in a circle around rim

<p>Invented by Thomas Jefferson in 1795, purely mechanical cryptography machine. composed of 36 disk, marked a-z in a circle around rim</p>
9
New cards

Enigma machine

intricate cryptographic machine created by Arthur Scherbius in 1923. For two Enigma machines to communicate they need to have same configuration. Enigma machine made it difficult for attempting to break messages generated by it.

<p>intricate cryptographic machine created by Arthur Scherbius in 1923. For two Enigma machines to communicate they need to have same configuration. Enigma machine made it difficult for attempting to break messages generated by it.</p>
10
New cards

Keyword Ciphers

substitution ciphers that use a key to determine what to substitute for each letter of the message.

11
New cards

Frequency Analysis

you can make guesses about what message contents might be based on the frequency of characters used

12
New cards

One-time pad

AKA Vernam Cipher. Unbreakable cioher when used properly. To use you create two copies of same pad of paper containing completely random set of #s (shifts) & give one copy to each party. To encrpyt you use the shifts to move each letter of message forward.

13
New cards

Symmetric Cryptography

AKA Private Key cryptography uses single key to both encrypt the plaintext and decrypt the ciphertext. You must share a single key among all users of the system which is chief weakness of symmetric key cryptography.

14
New cards

Key Exchange

Sharing a key between sender & reciever.

15
New cards

Block Cipher (one type of symmetric cryptography)

takes predetermined number of bits (binary digits 0 or 1) known as block & encrpyts the block. Majority of encryption algorithms currently in use are block ciphers. Slower but more versatile than stream ciphers

16
New cards

Stream Cipher

encrypts each bit in the plaintext message one bit at a time. You can make a block cipher as a stream cipher by setting block size to one bit

17
New cards

Block Mode

Defines specific processes and operations that the cipher uses

18
New cards

DES

first came in 1976 in the USA & since spread globally. block cipher that uses 56 bit key.

19
New cards

3DES

DES used to encrypt each block 3 times with 3 different keys

20
New cards

AES

set of symmetric block ciphers that replaced DES. Uses 3 different ciphers. one with 128 bit key, one with 192 bit key, and one with 256 bit key, all of which encrypt blocks of 128 bits

21
New cards

asymmetric key cryptography

AKA public key cryptography uses two keys: public key & private key. Public key is used to encrpyt data & anyone can access. Private keys are used to decrypt messages & are guarded.

22
New cards

RSA algorithm

an asymmetric key algorithm used across the world, named after creators Ron Rivest, Adi Shamir & Leonard Adleman

23
New cards

Elliptic Curve Cryptography (ECC)

class of cryptographic algorithms with several advantages. Can use short keys while maintaining a higher cryptographic strength. Fast & efficient type of algorithm that allows easy implementation on hardware/ less processing power & memory.

24
New cards

PGP

Created by Phil Zimmerman was on of first strong encryption tools to reach public eye. Created in 1900, & a symmetric algorithm, could be used to secure data such as communications & files. at time of release, was regulated by (ITAR)

25
New cards

Hash Functions

3rd type of modern cryptography AKA keyless cryptography. Converts the plaintext into a largely unique and fixed-length value called hash

26
New cards

PKI (public key infrastructure)

usually has 2 main components: the certificate autorities that issuue and verify certificates and the registration authorities that verify identity of individual associate. Can revoke certificates if they reach their expiration date.

27
New cards

Digital Signatures

an extension of hash functions to an identity so that you can ensure an excrypted message really represents communication from a particular individual.