Data Representation - Encryption

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards
What is encryption?
Using an algorithm and a key to scramble data and make it incomprehensible without decrypting it with the same key (plain text into cipher text)
2
New cards
What is decryption?
Using an algorithm and a key to unscramble encrypted data into its original, comprehensible form (cipher text into plain text)
3
New cards
What is plain text?
Data before its encryption (After decryption)
4
New cards
What is cipher text?
Data after its encryption
5
New cards
In encryption, what is a key?
An item of data that defines how the plain text is converted into the cipher text
6
New cards
Why do we encrypt data?
To prevent unwanted readers who may want to use the data in malicious or unintended ways
7
New cards
How does the Caesar cipher work?
It encrypts alphabetic messages by replacing letters with ones further down the alphabet
8
New cards
Why is the Caesar cipher considered very weak as an encryption method?
-It is susceptible to brute force
9
New cards
-It is susceptible to frequency analysis
10
New cards
-The same key is used for every letter and for every transmission therefore, once you figure out the key, you can decrypt all messages encrypted in that way
11
New cards
What is the brute force method?
Where you use every key possible to try and decrypt the cipher text
12
New cards
What is frequency analysis?
Where cipher text (which had alphabetic plain text) is analysed and compared with known patterns in the English language
13
New cards
What is a one-time pad?
A key that is used for encryption or decryption but is discarded after use
14
New cards
How does the Vernam cipher work?
The plain text is paired to a one-time pad then each character in the plain text is encrypted with its corresponding character in the onetime pad
15
New cards
What conditions must a one-time pad fulfil?
-It is randomly generated in a truly random way
16
New cards
-It is as long as the plain text
17
New cards
-It is not reused
18
New cards
-It is kept completely secret
19
New cards
What operation is applied to encrypt or decrypt with the Vernam cipher?
XOR
20
New cards
Why is the Vernam cipher perfectly secure?
The key is completely random and and each character is encrypted differently therefore there's no way of knowing what a character in the cipher text represents - it could represent anything
21
New cards
Why would the Vernam cipher be impractical or difficult?
-Generating truly random numbers is complex
22
New cards
-Informing the receiver of the key is difficult as the key could be intercepted
23
New cards
-The more messages you send and the longer the messages, the more keys you need
24
New cards
What are computationally secure ciphers?
Ciphers which are theoretically breakable,
25
New cards
but not using current technology in a practical amount of time
26
New cards
Why are computationally secure ciphers preferred over the Vernam cipher?
Vernam cipher is difficult to use and unnecessary