Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 25
There's no tags or description
Looks like no one added any tags here yet for you.
26 Terms
1
What is encryption?
Using an algorithm and a key to scramble data and make it incomprehensible without decrypting it with the same key (plain text into cipher text)
New cards
2
What is decryption?
Using an algorithm and a key to unscramble encrypted data into its original, comprehensible form (cipher text into plain text)
New cards
3
What is plain text?
Data before its encryption (After decryption)
New cards
4
What is cipher text?
Data after its encryption
New cards
5
In encryption, what is a key?
An item of data that defines how the plain text is converted into the cipher text
New cards
6
Why do we encrypt data?
To prevent unwanted readers who may want to use the data in malicious or unintended ways
New cards
7
How does the Caesar cipher work?
It encrypts alphabetic messages by replacing letters with ones further down the alphabet
New cards
8
Why is the Caesar cipher considered very weak as an encryption method?
-It is susceptible to brute force
New cards
9
-It is susceptible to frequency analysis
New cards
10
-The same key is used for every letter and for every transmission therefore, once you figure out the key, you can decrypt all messages encrypted in that way
New cards
11
What is the brute force method?
Where you use every key possible to try and decrypt the cipher text
New cards
12
What is frequency analysis?
Where cipher text (which had alphabetic plain text) is analysed and compared with known patterns in the English language
New cards
13
What is a one-time pad?
A key that is used for encryption or decryption but is discarded after use
New cards
14
How does the Vernam cipher work?
The plain text is paired to a one-time pad then each character in the plain text is encrypted with its corresponding character in the onetime pad
New cards
15
What conditions must a one-time pad fulfil?
-It is randomly generated in a truly random way
New cards
16
-It is as long as the plain text
New cards
17
-It is not reused
New cards
18
-It is kept completely secret
New cards
19
What operation is applied to encrypt or decrypt with the Vernam cipher?
XOR
New cards
20
Why is the Vernam cipher perfectly secure?
The key is completely random and and each character is encrypted differently therefore there's no way of knowing what a character in the cipher text represents - it could represent anything
New cards
21
Why would the Vernam cipher be impractical or difficult?
-Generating truly random numbers is complex
New cards
22
-Informing the receiver of the key is difficult as the key could be intercepted
New cards
23
-The more messages you send and the longer the messages, the more keys you need
New cards
24
What are computationally secure ciphers?
Ciphers which are theoretically breakable,
New cards
25
but not using current technology in a practical amount of time
New cards
26
Why are computationally secure ciphers preferred over the Vernam cipher?