INTECH 3201 - Cryptography and Encryption

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

Cryptography and Encryption

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Cryptography

The art of communication between two users via coded messages

2
New cards

Encryption

The process of scrambling data into a code that can only be decoded with a key.

3
New cards

Plaintext

The original representation of the information

4
New cards

Ciphertext

The encoded version of the information

5
New cards

Encryption key

A unique digital key that unlocks the code

6
New cards

Decryption

The process of turning ciphertext back into plaintext

7
New cards

earliest written evidence of encryption can be traced to ancient ___. Nearly ____ years ago

Egypt, 4’000

8
New cards

tomb of nobleman ____ contained a script recording his deeds in life (ENCRYPTED)

Khnumhotep II

9
New cards

Ancient encryption in Egypt was used mainly to ______, as education was a privilege limited to the highest circles of society and was also a way to show one’s skills in writing. It was also used for religious reasons, for example, to discuss taboos.

protect knowledge

10
New cards

The first recorded instance of encryption being used for military purposes dates to around ____ BC

500

11
New cards

scytale

Spartan encryption used an invention called the ______, which allowed secret messages to be sent and received.

12
New cards

common key

first time the concept of a ____, seen even today in modern cryptographic technologies, was used for both encryption and decryption.

13
New cards

Caesar Shift Cipher

knowt flashcard image
14
New cards

World War II (ENIGMA)

knowt flashcard image
15
New cards

World War II (ENIGMA)

has an electromechanical rotor mechanism that scrambles the 26 letters of the alphabet.

16
New cards

When did data encryption become popular?

Through the early 1970s, cryptology was dominated by governments both because computers were very expensive and because of the need for information retention.

17
New cards

RSA algorithm (named after its inventors ______, ______, __________)

Ron Rivest, Adi Shamir, and Leonard Adleman

18
New cards

RSA introduced the concept of a __________ for encryption

public-private key pair

19
New cards

Confidentiality

Integrity

Authentication

Non-repudiation

Key management

Cryptography - Principles

20
New cards

Confidentiality

Cryptography - Principles - The main idea of Confidentiality is to keep data safe so that information stays private and secure

21
New cards

Cryptography - Principles -

Integrity means ensuring that our data in transit or after receiving is intact or not.

It is the ability to make sure that data or information has not been changed or modified with.

Integrity

22
New cards

Cryptography - Principles -

Authentication is the process of validating the identity of a user or device. Cryptographic methods, like digital signatures, can be used to securely verify the identification of a person or device.

Authentication

23
New cards

Cryptography - Principles -

___________ is a method of stopping a person from denying that he or she has committed a particular act or crime.

Non-repudiation

24
New cards

Cryptography - Principles -

Key management is the process of creating, distributing, and managing cryptographic keys

Key Management

25
New cards

2 main type of cryptographic systems

Symmetric

Asymmetric

26
New cards

Symmetric Encryption

________ uses a single key for both encryption and decryption. The sender and receiver must share this key securely.

27
New cards

How symmetric encryption works?

The sender encrypts the plaintext using a secret key and an encryption algorithm (e.g., AES). The encrypted ciphertext is sent to the receiver. The receiver decrypts the ciphertext using the same secret key to retrieve the original plaintext.

28
New cards

Examples of Symmetric Encryption Algorithms

Data Encryption Standard (DES) – A 56-bit key encryption method, now considered weak.

Triple DES (3DES) – An improved version of DES that applies encryption three times. Advanced Encryption Standard

(AES) – A widely used and highly secure algorithm with key sizes of 128, 192, or 256 bits.

29
New cards

Advantages of Symmetric Encryption

Fast and efficient (suitable for large amounts of data).

Requires less computational power compared to asymmetric encryption.

30
New cards

Disadvantages of Symmetric Encryption

Key distribution is a challenge—if the key is intercepted, security is compromised. Not ideal for secure communication between unknown parties.

31
New cards

Asymmetric Encryption

______, also known as public-key cryptography, uses two keys: Public Key (used for encryption) Private Key (used for decryption)

32
New cards

Asymmetric Encryption

type of encryption where The public key is shared openly, while the private key is kept secret.

33
New cards

How asymmetric encryption works?

The sender encrypts the plaintext using the recipient’s public key. The encrypted message (ciphertext) is sent to the receiver. The receiver decrypts the ciphertext using t

34
New cards

Rivest-Shamir-Adleman (RSA) – A widely used encryption algorithm, often used for securing online transactions and emails.

Elliptic Curve Cryptography (ECC) – A more efficient alternative to RSA, used in mobile and IoT security.

Examples of Asymmetric Encryption Algorithms

35
New cards

Rivest-Shamir-Adleman (RSA) – A widely used encryption algorithm, often used for securing online transactions and emails.

Elliptic Curve Cryptography (ECC) – A more efficient alternative to RSA, used in mobile and IoT security.

Advantages of Asymmetric Encryption

36
New cards

Disadvantages of Asymmetric Encryption

Slower than symmetric encryption due to complex computations.

Requires more computational power.

37
New cards

Real-World Use Case

knowt flashcard image
38
New cards

Real-World Use Case

knowt flashcard image