Lecture 12 - Cryptography

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:10 AM on 6/6/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

Plaintext

a message in its original form

2
New cards

Ciphertext

a message in the transformed, unrecognized form

3
New cards

Encryption

the process that transforms a plaintext into a ciphertext

4
New cards

Decryption

the process that transforms a ciphertext to the corresponding plaintext

5
New cards

Key

the value used to control encryption/decryption

6
New cards

Symmetric encryption

the key used to encrypt a message is the same as the one used to decrypt it

7
New cards

Asymmetric encryption

the key used to decrypt a message is different from the key used to encrypt it

8
New cards

Algorithm and Key

Algorithm performs encryption or decryption; key is essential for determining cipher output.

9
New cards

brute force attack

try all possible keys on some ciphertext until get an intelligible translation into plaintext (used if don't know the key)

10
New cards

Key management

With symmetric encryption, the communicating parties must share the one key.

Keys must be shared among the senders and receivers very carefully.

Separate key used for communications for different companies

11
New cards

Data Encryption Standard (DES)

Developed in the mid-1970s. The most common form uses a 56-bit key, which can be broken by experts in less than a day.

12
New cards

Triple DES (3DES)

Three different keys to produce the encrypted text.

13
New cards

Advanced Encryption Standard (AES)

Using the most advanced computers and techniques available today, it will require about 150 trillion years to crack AES by brute force.

Life span is around 20 years

14
New cards

RSA

most popular form of asymmetric encryption, 2 keys, 1 public for encryption, and 1 private for decryption.

Explore top flashcards

TMJ and MoM
Updated 701d ago
flashcards Flashcards (32)
CMS II Final: Endo
Updated 261d ago
flashcards Flashcards (293)
Chapter 21
Updated 159d ago
flashcards Flashcards (29)
E1 Ortho- Cervical
Updated 372d ago
flashcards Flashcards (102)
Capibara 1-3
Updated 1062d ago
flashcards Flashcards (28)
TMJ and MoM
Updated 701d ago
flashcards Flashcards (32)
CMS II Final: Endo
Updated 261d ago
flashcards Flashcards (293)
Chapter 21
Updated 159d ago
flashcards Flashcards (29)
E1 Ortho- Cervical
Updated 372d ago
flashcards Flashcards (102)
Capibara 1-3
Updated 1062d ago
flashcards Flashcards (28)