Symmetric-Key Cryptography Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from a lecture on Symmetric-Key Cryptography.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Symmetric Encryption Algorithms

Encryption algorithms that use the same key for both encryption and decryption.

2
New cards

Plaintext

The unencrypted message or data.

3
New cards

Ciphertext

The encrypted message or data, appearing as gibberish.

4
New cards

Key

A secret number used by cryptographic algorithms to encrypt and decrypt data.

5
New cards

Decryption

The process of converting ciphertext back into its original plaintext form.

6
New cards

Lock

An encryption algorithm used to protect the contents of files on a computer.

7
New cards

Cryptanalysis

The study of methods to defeat cryptographic techniques.

8
New cards

Random Values

Values that pass statistical tests of randomness and are unrepeatable.

9
New cards

Random Number Generator (RNG) / True Random Number Generator (TRNG)

A device or hardware that gathers numbers from unpredictable inputs to generate random numbers.

10
New cards

Pseudo-Random Number Generators (PRNGs)

Algorithms that produce numbers that pass statistical tests but are repeatable.

11
New cards

Seed

Value used to change the output of a Pseudo-Random Number Generator.

12
New cards

Entropy

Describes the measure of chaos or randomness in a system. The greater the value, the greater the chaos.

13
New cards

Ciphertext-only attack

An attack where an attacker only has collection of ciphertexts

14
New cards

Known-plaintext attack

An attack where the attacker knows some pairs of ciphertext and corresponding plaintext

15
New cards

Chosen-plaintext attack

An attack where the attacker can choose a number of messages and obtain the ciphertexts

16
New cards

Chosen-ciphertext attack

An attack where the adversary can choose a number of ciphertexts and obtain the plaintexts.

17
New cards

Brute-Force Attack

An exhaustive search that tries all possible keys to decrypt a ciphertext.

18
New cards

Key Table

A pseudo-random array of a particular size and in a particular format.

19
New cards

Key Setup

The process of building a key table, or initialisation.

20
New cards

Confusion

Technique used to obscure the relationship between the key and the ciphertext.

21
New cards

Diffusion

Encryption operation where the influence of one plaintext symbol is spread over many ciphertext symbols.

22
New cards

Block Cipher

Cipher that divides plaintext into fixed-size blocks, encrypting each block independently.

23
New cards

Padding

Adding extra bytes to an incomplete block to make it complete for encryption.

24
New cards

Triple DES (3DES)

Nested application of DES with three different keys.

25
New cards

Advanced Encryption Standard (AES)

Symmetric encryption algorithm selected by NIST in 2001 with 128-bit blocks and variable key lengths.

26
New cards

Feedback Modes

Avoid copies in ciphertext utilizing feedback modes.

27
New cards

Cipher Block Chaining (CBC)

A feedback mode in which you XOR the current block of plaintext with the preceding block of ciphertext

28
New cards

Initialization Vector (IV)

A random block separately transmitted encrypted

29
New cards

One-Time Pad (OTP)

Encryption algorithm where the plaintext is combined with a random key, or "pad," that is as long as the plaintext and used only once.

30
New cards

Stream Cipher

Generates a pad based on the key where the pad can be as big as it needs to be. The algorithm will XOR the plaintext with the pad

31
New cards

Key Stream

In cryptography circles, the "pad" is called this.