Software Security - Week 10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts from the lecture notes on Software Security and Data Privacy.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Encryption

The process of converting data into an unreadable format, accessible only with authorization.

2
New cards

Decryption

The process of converting encrypted data back into its original, readable format.

3
New cards

Symmetric Key Encryption

A type of encryption that uses a single key for both encryption and decryption.

4
New cards

Asymmetric Key Encryption

A type of encryption that uses a pair of keys—one for encryption and another for decryption.

5
New cards

Encryption Algorithm

Performs substitution and transposition on plaintext, taking plaintext and a key as input to produce ciphertext.

6
New cards

Secret Key

Input to the encryption algorithm, independent of the plaintext and the algorithm itself.

7
New cards

Ciphertext

Scrambled message produced as the output of the encryption algorithm.

8
New cards

Decryption Algorithm

Reverses the encryption algorithm to transform ciphertext back into plaintext, using the key.

9
New cards

Substitution

Letters of plaintext are replaced by other letters, numbers, or symbols.

10
New cards

Transposition

The position of letters or bits within the plaintext are changed.

11
New cards

Caesar Cipher

Each letter in the plaintext is replaced by a letter a fixed number of positions down the alphabet.

12
New cards

Plaintext

Simple message written by the user before encryption.

13
New cards

Ciphertext

Encrypted message after applying encryption techniques to the plaintext.

14
New cards

Playfair Cipher

Multiple-letter encryption technique using a 5x5 matrix of letters constructed with a keyword.

15
New cards

Railfence

A transposition technique where plaintext is written down as a sequence of diagonals and read off as rows.

16
New cards

Public-key cryptosystems

Algorithms based on mathematical functions, using two separate keys for encryption and decryption.

17
New cards

Public-Key Cryptosystem

An encryption system that uses a public key for encryption and a private key for decryption.

18
New cards

RSA

First algorithm to meet the requirements of a public-key cryptosystem, using integers between 0 and n-1.

19
New cards

Diffie-Hellman Key Exchange

A key exchange protocol that allows two parties to securely share a secret key over a public network.

20
New cards

Primitive Root

A number whose powers modulo p generate all the integers from 1 to p-1, where p is a prime number.