Symmetric Encryption

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

flashcard set

Earn XP

Description and Tags

Flashcards covering core concepts of symmetric encryption, including definitions, historical ciphers, attack types, and algorithm categories like block and stream ciphers, and key principles like Kerckhoff’s Principle.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Active attack

An attempt to alter system resources or affect their operation.

2
New cards

Passive Attack

An attempt to learn or make use of information from a system without affecting its resources.

3
New cards

Man-in-the-Middle (MitM) Attack / On-Path Attack

An attack where the adversary intercepts traffic between two communicating parties.

4
New cards

Plaintext

The original, unencrypted form of a message.

5
New cards

Ciphertext

The encrypted form of a message.

6
New cards

Key

A piece of information used to encrypt or decrypt messages/data.

7
New cards

Key space

The set of all possible keys.

8
New cards

Symmetric Encryption

An encryption method that uses the same key for both encryption and decryption.

9
New cards

Asymmetric Encryption

An encryption method that uses separate keys (a pair) for encryption and decryption.

10
New cards

Caesar Cipher / Shift Cipher

A simple substitution cipher where each letter in the plaintext is replaced by a letter a fixed number of positions down the alphabet.

11
New cards

Substitution cipher

A method of encryption where units of plaintext are replaced with ciphertext, according to a regular system, often using symbols or shifted letters.

12
New cards

Frequency analysis

A method for breaking ciphers, especially substitution ciphers, by studying the frequency of letters or patterns in the ciphertext.

13
New cards

Vigenère cipher / Polyalphabetic cipher

An encryption method that uses a series of different Caesar ciphers based on the letters of a keyword, making it more resistant to frequency analysis.

14
New cards

One-to-many plaintext to ciphertext

A property of ciphers like Vigenère where a single plaintext letter can be encrypted to multiple different ciphertext letters, depending on its position and the key.

15
New cards

Kerckhoff’s Principle

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge; security relies solely on the secrecy of the key.

16
New cards

Security through Obscurity

The belief that a system is secure if its inner workings are unknown to the public; considered not a secure method.

17
New cards

Stream Cipher

An encryption method that encrypts data bit by bit as it is transmitted, without breaking it into chunks.

18
New cards

Block Cipher

An encryption method that encrypts data by grouping it into fixed-size chunks (blocks).

19
New cards

Enigma Cipher

A historical stream cipher used by Germany in WWII.

20
New cards

Data Encryption Standard (DES)

An older block cipher, deprecated around 2017 and prohibited for federal government interaction by 2023 due to its limited key length.

21
New cards

Advanced Encryption Standard (AES)

A modern and frequently used block cipher, adopted as a standard after 'Rijndael'.

22
New cards

Diffusion

A property of a cipher where a change in a single plaintext character statistically results in about half of the bits of the ciphertext changing.

23
New cards

Confusion

A property of a cipher that aims to obscure the relationship between the ciphertext and the key, making it difficult to determine which part of the key created which part of the ciphertext.

24
New cards

Padding

Adding extra data to a message in a block cipher to make its length exactly match a multiple of the block size.

25
New cards

Double DES (2DES)

A DES variant that uses two 56-bit keys to encrypt data twice, increasing strength.

26
New cards

Two-key Triple DES (3DES)

A DES variant that uses two 56-bit keys in a three-step encryption process (Encrypt-Decrypt-Encrypt), offering increased strength.

27
New cards

Three-key Triple DES (3DES)

A DES variant that uses three distinct 56-bit keys in a three-step encryption process (Encrypt-Decrypt-Encrypt), providing significantly higher strength.

28
New cards

Rijndael

The original name of the algorithm that was adopted as the Advanced Encryption Standard (AES).

29
New cards

ECB (Electronic Codebook)

A block cipher mode where each block of plaintext is encrypted independently with the same key.

30
New cards

CBC (Cipher Block Chaining)

A block cipher mode where each block of plaintext is XORed with the previous ciphertext block before encryption, using an Initialization Vector (IV).

31
New cards

CFB (Cipher Feedback)

A block cipher mode that makes a block cipher into a stream cipher, where ciphertext depends on all preceding plaintext.

32
New cards

OFB (Output Feedback)

A block cipher mode that makes a block cipher into a stream cipher, where feedback for encryption is independent of plaintext or ciphertext.

33
New cards

XOR (Exclusive OR)

A logical bitwise operation that outputs true (1) if inputs differ, and false (0) if inputs are the same; often used in symmetric encryption.

34
New cards

PEBKAC (Problem Exists Between Keyboard And Chair)

A humorous acronym indicating that user error is the cause of a problem, highlighting humans as a weak link in cybersecurity.

35
New cards

Brute Force Attack

An attack that tries every possible key until the correct one is found.

36
New cards

Ciphertext Only Attack

An attack where the adversary has only a collection of ciphertexts and attempts to deduce the plaintext or the key.

37
New cards

Known-Plaintext Attack (KPA)

An attack where the adversary has access to both the plaintext and its corresponding ciphertext.

38
New cards

Chosen-Plaintext Attack (CPA)

An attack where the adversary can choose arbitrary plaintexts to be encrypted and obtain their corresponding ciphertexts.

39
New cards

Adaptive-Chosen-Plaintext Attack

A type of chosen-plaintext attack where the attacker can choose subsequent plaintexts based on information learned from previous encryptions.

40
New cards

Chosen-Ciphertext Attack (CCA)

An attack where the adversary can choose arbitrary ciphertexts and obtain their corresponding plaintexts (decryptions).

41
New cards

Chosen-Key Attack

An attack where the adversary has some control over or knowledge of the key used for encryption.

42
New cards

Wrench Attack

A non-technical, human-factor attack where a person is physically coerced to reveal a password or key.