Sec+ 3.0 Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

Cryptography

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Cryptography

The idea of alternating data to make it unintelligible to unauthorized parties.

2
New cards

Plaintext

The encrypted data after is it decrypted or the the data that is unencrypted but about to be encrypted.

3
New cards

Ciphertext

Data that has been enciphered and cannot be read without the cipher key

4
New cards

Algorithim

AKA a cipher, the operation that transforms plaintext to ciphertext

5
New cards

Cryptanalysis

The science and art associated with breaking codes and ciphers.

6
New cards

Encryption

Scrambling the characters used in a message so that message can be seen but not understood or modified.

A secure way of transmitting data and authenticating users.

A way to store data more securely

7
New cards

Key

A specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption.

8
New cards

Symmetric encryption

AKA Shared-key encryption. 2-way encryption and decryption where they both have the same key.

9
New cards

Key length

The size of the cryptographic key in bits. The longer the key the better the security.

10
New cards

Asymmetric algorithm

Cipher that uses public and private keys. The private key is not derivable from the public key. Cannot reverse the operation it performs (ie. a public key cannot decrypt what it has encrypted)

Mathematically linked.

11
New cards

Public key

During asymmetric encryption, it is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.’

More easily: same key used to unlock/locl

12
New cards

Private key

In asymmetric encryption, this key is only known to the holder. Not derivable from the public key.

Can be used to encrypt data that can be decrypted by the linked public key. VV

more easily: One key to lock, a different key to unlock

13
New cards

Blockchain

A concept where an expanding list of transactional records listed in a public ledger are secured using cryptography.

14
New cards

Open public ledger

Underpins the integrity of blockchains. Distributed public records of transactions.

15
New cards

Steganography

The practice of concealing a file, message, image or video within another file, message, image, or video.

16
New cards

Hashing

Is the process of converting one value into another.

2 messages will have different hashing values.

17
New cards

Salting a hash

Adding a random number to the data being hashed before the hash. Randomly determined each time.

18
New cards

Ephemeral Keys

Used with messaging because each message has a new key associated with it.

19
New cards

Hybrid Cryptosystems

Combines the efficiency of symmetric encryption with the convenience of asymmetric encryptionnum.

20
New cards

Stream Cipher

Symmetric encryption method. Encryption one bit at a time. Key is the same length as the data.

21
New cards

Block Ciphers

Encrypted one block at a time.

22
New cards

Lightweight Cryptography

Standardized encryption algorithms meant to be used on IoT devices.

23
New cards

Homomorphic Encryption

Allows the data to be worked on without decrypting it first.