INTECH 3201 - Cryptography and Encryption

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 37

flashcard set

Earn XP

Description and Tags

Cryptography and Encryption

38 Terms

1

Cryptography

The art of communication between two users via coded messages

New cards
2

Encryption

The process of scrambling data into a code that can only be decoded with a key.

New cards
3

Plaintext

The original representation of the information

New cards
4

Ciphertext

The encoded version of the information

New cards
5

Encryption key

A unique digital key that unlocks the code

New cards
6

Decryption

The process of turning ciphertext back into plaintext

New cards
7

earliest written evidence of encryption can be traced to ancient ___. Nearly ____ years ago

Egypt, 4’000

New cards
8

tomb of nobleman ____ contained a script recording his deeds in life (ENCRYPTED)

Khnumhotep II

New cards
9

Ancient encryption in Egypt was used mainly to ______, as education was a privilege limited to the highest circles of society and was also a way to show one’s skills in writing. It was also used for religious reasons, for example, to discuss taboos.

protect knowledge

New cards
10

The first recorded instance of encryption being used for military purposes dates to around ____ BC

500

New cards
11

scytale

Spartan encryption used an invention called the ______, which allowed secret messages to be sent and received.

New cards
12

common key

first time the concept of a ____, seen even today in modern cryptographic technologies, was used for both encryption and decryption.

New cards
13

Caesar Shift Cipher

knowt flashcard image
New cards
14

World War II (ENIGMA)

knowt flashcard image
New cards
15

World War II (ENIGMA)

has an electromechanical rotor mechanism that scrambles the 26 letters of the alphabet.

New cards
16

When did data encryption become popular?

Through the early 1970s, cryptology was dominated by governments both because computers were very expensive and because of the need for information retention.

New cards
17

RSA algorithm (named after its inventors ______, ______, __________)

Ron Rivest, Adi Shamir, and Leonard Adleman

New cards
18

RSA introduced the concept of a __________ for encryption

public-private key pair

New cards
19

Confidentiality

Integrity

Authentication

Non-repudiation

Key management

Cryptography - Principles

New cards
20

Confidentiality

Cryptography - Principles - The main idea of Confidentiality is to keep data safe so that information stays private and secure

New cards
21

Cryptography - Principles -

Integrity means ensuring that our data in transit or after receiving is intact or not.

It is the ability to make sure that data or information has not been changed or modified with.

Integrity

New cards
22

Cryptography - Principles -

Authentication is the process of validating the identity of a user or device. Cryptographic methods, like digital signatures, can be used to securely verify the identification of a person or device.

Authentication

New cards
23

Cryptography - Principles -

___________ is a method of stopping a person from denying that he or she has committed a particular act or crime.

Non-repudiation

New cards
24

Cryptography - Principles -

Key management is the process of creating, distributing, and managing cryptographic keys

Key Management

New cards
25

2 main type of cryptographic systems

Symmetric

Asymmetric

New cards
26

Symmetric Encryption

________ uses a single key for both encryption and decryption. The sender and receiver must share this key securely.

New cards
27

How symmetric encryption works?

The sender encrypts the plaintext using a secret key and an encryption algorithm (e.g., AES). The encrypted ciphertext is sent to the receiver. The receiver decrypts the ciphertext using the same secret key to retrieve the original plaintext.

New cards
28

Examples of Symmetric Encryption Algorithms

Data Encryption Standard (DES) – A 56-bit key encryption method, now considered weak.

Triple DES (3DES) – An improved version of DES that applies encryption three times. Advanced Encryption Standard

(AES) – A widely used and highly secure algorithm with key sizes of 128, 192, or 256 bits.

New cards
29

Advantages of Symmetric Encryption

Fast and efficient (suitable for large amounts of data).

Requires less computational power compared to asymmetric encryption.

New cards
30

Disadvantages of Symmetric Encryption

Key distribution is a challenge—if the key is intercepted, security is compromised. Not ideal for secure communication between unknown parties.

New cards
31

Asymmetric Encryption

______, also known as public-key cryptography, uses two keys: Public Key (used for encryption) Private Key (used for decryption)

New cards
32

Asymmetric Encryption

type of encryption where The public key is shared openly, while the private key is kept secret.

New cards
33

How asymmetric encryption works?

The sender encrypts the plaintext using the recipient’s public key. The encrypted message (ciphertext) is sent to the receiver. The receiver decrypts the ciphertext using t

New cards
34

Rivest-Shamir-Adleman (RSA) – A widely used encryption algorithm, often used for securing online transactions and emails.

Elliptic Curve Cryptography (ECC) – A more efficient alternative to RSA, used in mobile and IoT security.

Examples of Asymmetric Encryption Algorithms

New cards
35

Rivest-Shamir-Adleman (RSA) – A widely used encryption algorithm, often used for securing online transactions and emails.

Elliptic Curve Cryptography (ECC) – A more efficient alternative to RSA, used in mobile and IoT security.

Advantages of Asymmetric Encryption

New cards
36

Disadvantages of Asymmetric Encryption

Slower than symmetric encryption due to complex computations.

Requires more computational power.

New cards
37

Real-World Use Case

knowt flashcard image
New cards
38

Real-World Use Case

knowt flashcard image
New cards

Explore top notes

note Note
studied byStudied by 25 people
951 days ago
5.0(1)
note Note
studied byStudied by 27 people
884 days ago
5.0(1)
note Note
studied byStudied by 141 people
830 days ago
5.0(1)
note Note
studied byStudied by 2783 people
1359 days ago
5.0(3)
note Note
studied byStudied by 20 people
955 days ago
5.0(1)
note Note
studied byStudied by 1 person
43 days ago
4.0(1)
note Note
studied byStudied by 12 people
966 days ago
5.0(1)
note Note
studied byStudied by 66 people
784 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 96 people
542 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 26 people
756 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 866 people
846 days ago
4.9(44)
flashcards Flashcard (39)
studied byStudied by 33 people
789 days ago
5.0(4)
flashcards Flashcard (35)
studied byStudied by 4 people
665 days ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 3 people
837 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 21 people
546 days ago
5.0(1)
flashcards Flashcard (342)
studied byStudied by 28427 people
414 days ago
4.5(133)
robot