Lecture 12 - Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Plaintext

a message in its original form

2
New cards

Ciphertext

a message in the transformed, unrecognized form

3
New cards

Encryption

the process that transforms a plaintext into a ciphertext

4
New cards

Decryption

the process that transforms a ciphertext to the corresponding plaintext

5
New cards

Key

the value used to control encryption/decryption

6
New cards

Symmetric encryption

the key used to encrypt a message is the same as the one used to decrypt it

7
New cards

Asymmetric encryption

the key used to decrypt a message is different from the key used to encrypt it

8
New cards

Algorithm and Key

Algorithm performs encryption or decryption; key is essential for determining cipher output.

9
New cards

brute force attack

try all possible keys on some ciphertext until get an intelligible translation into plaintext (used if don't know the key)

10
New cards

Key management

With symmetric encryption, the communicating parties must share the one key.

Keys must be shared among the senders and receivers very carefully.

Separate key used for communications for different companies

11
New cards

Data Encryption Standard (DES)

Developed in the mid-1970s. The most common form uses a 56-bit key, which can be broken by experts in less than a day.

12
New cards

Triple DES (3DES)

Three different keys to produce the encrypted text.

13
New cards

Advanced Encryption Standard (AES)

Using the most advanced computers and techniques available today, it will require about 150 trillion years to crack AES by brute force.

Life span is around 20 years

14
New cards

RSA

most popular form of asymmetric encryption, 2 keys, 1 public for encryption, and 1 private for decryption.