Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

flashcard set

Earn XP

Description and Tags

These flashcards cover fundamental concepts of cybersecurity and cryptography, including definitions of key terms, principles, and protocols.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

Cryptography

The study of mathematical techniques to provide aspects of information security services.

2
New cards

Cryptanalysis

The study of mathematical techniques for attempting to defeat information security services.

3
New cards

Cryptology

The study of cryptography and cryptanalysis.

4
New cards

Plaintext

The original unencrypted message or information.

5
New cards

Ciphertext

The encrypted form of the plaintext message.

6
New cards

Encryption

The process of converting plaintext into ciphertext.

7
New cards

Decryption

The process of converting ciphertext back into plaintext.

8
New cards

Encryption Key

A key used to encrypt plaintext.

9
New cards

Decryption Key

A key used to decrypt ciphertext.

10
New cards

Alice

A common label for the sender in cryptographic protocols.

11
New cards

Bob

A common label for the receiver in cryptographic protocols.

12
New cards

Eve

A common label for an eavesdropper in cryptographic scenarios.

13
New cards

Mallory

A common label for a malicious attacker in cryptographic scenarios.

14
New cards

Confidentiality

A goal of cryptography that ensures data is not accessed by unauthorized parties.

15
New cards

Integrity

A goal of cryptography that ensures data has not been altered in unauthorized ways.

16
New cards

Authenticity

A goal of cryptography that ensures the source of the data is genuine.

17
New cards

Non-repudiation

A goal of cryptography that ensures authorship cannot be denied by the sender.

18
New cards

Pseudo-random number generation

The process of producing random numbers that are determinate from an initial value.

19
New cards

Anonymity

The state of being not identifiable within a set of subjects.

20
New cards

E-voting

An electronic method of casting votes in an election.

21
New cards

Secret sharing

A method of distributing a secret among a group so that only a specific subset can reconstruct it.

22
New cards

Zero-knowledge proof

A method used to prove that something is true without revealing any information about the proof.

23
New cards

Homomorphic encryption

Encryption that allows computation on ciphertexts, generating an encrypted result.

24
New cards

Chosen-plaintext attack

An attack model where the attacker can choose arbitrary plaintexts to be encrypted.

25
New cards

Chosen-ciphertext attack

An attack model where the attacker can choose ciphertexts and obtain the corresponding plaintexts.

26
New cards

Kerchhoff’s Principle

A principle stating that a cryptosystem should be secure even if everything except the key is public.

27
New cards

Shannon’s Maxim

The principle that the security of a cryptosystem should not rely on the obscurity of the algorithm.

28
New cards

Brute force

A method of defeating a cryptographic scheme by trying all possible keys.

29
New cards

Monoalphabetic substitution cipher

A cipher where each letter is replaced with another letter in a fixed substitution.

30
New cards

Frequency analysis

The study of the frequency of letters or groups of letters in a ciphertext.

31
New cards

Vigenère Cipher

A method of encrypting alphabetic text by using a simple form of polyalphabetic substitution.

32
New cards

Kasisky test

A method to determine the length of the keyword used in Vigenère cipher.

33
New cards

One Time Pad (OTP)

An encryption method that cannot be cracked if used correctly, utilizing a random key that is as long as the message.

34
New cards

Perfect Secrecy

A property of an encryption method where the ciphertext gives no information about the plaintext.

35
New cards

Symmetric Key Cryptography

Cryptography using the same key for both encryption and decryption.

36
New cards

Data Encryption Standard (DES)

A widely used symmetric-key algorithm for encrypting data.

37
New cards

Advanced Encryption Standard (AES)

A symmetric encryption algorithm that is the successor to DES, offering higher security.

38
New cards

Electronic Code Book (ECB)

A simple encryption mode where each block is encrypted independently.

39
New cards

Cipher Block Chaining (CBC)

An encryption mode that combines blocks to achieve confidentiality through chaining.

40
New cards

Certificate Authorities (CAs)

Entities that issue digital certificates for public key cryptography.

41
New cards

Transport Layer Security (TLS)

A protocol that ensures privacy between communicating applications and users on the Internet.

42
New cards

Public Key Cryptography

Cryptography employing pairs of keys: one public and one private.

43
New cards

Diffie-Hellman

A method for securely exchanging cryptographic keys over a public channel.

44
New cards

RSA

A widely used public key cryptography algorithm based on the factoring of large integers.

45
New cards

Digital Signatures

A mathematical scheme for verifying the authenticity and integrity of a message.

46
New cards

Cryptographic Hash Functions

Functions that convert input data into a fixed-size string of characters, which is typically a hash.

47
New cards

Collision resistance

The property of a hash function that makes it infeasible to find two different inputs that produce the same output.

48
New cards

X.509 Certificates

A standard format for public key certificates used in various network protocols.

49
New cards

Key Compromise

A situation in which a secret key is revealed to unauthorized parties.

50
New cards

Certificate Revocation List (CRL)

A list of certificates that have been revoked by the issuer.

51
New cards

Online Certificate Status Protocol (OCSP)

A protocol for checking the revocation status of a digital certificate.

52
New cards

Web of Trust

A decentralized model for establishing a chain of trust among users.

53
New cards

Pretty Good Privacy (PGP)

An encryption program that provides cryptographic privacy and authentication.

54
New cards

Gnu Privacy Guard (GPG)

A free implementation of the OpenPGP standard for encryption.

55
New cards

Transport Layer Security (TLS)

Ensures privacy between communicating applications and users on the Internet.

56
New cards

Key Signing

The process where trusted entities vouch for the authenticity of public keys.

57
New cards

Man-in-the-Middle (MitM) Attack

An attack where the attacker secretly relays and potentially alters the communication between two parties.

58
New cards

Authentication

The process of verifying the identity of a user or system.

59
New cards

Secret Sharing Schemes

Methods that allow a secret to be divided into parts, where some parts are required to reconstruct the secret.

60
New cards

Key Distribution Problem

The challenge of securely sharing cryptographic keys between parties.

61
New cards

Homomorphic Encryption

Encryption that allows computations to be carried out on ciphertexts.

62
New cards

Asymmetric Encryption

Encryption that uses a public key for encryption and a private key for decryption.

63
New cards

Compression

The process of reducing the size of data.

64
New cards

Nonce

A number used once in cryptographic communication to ensure security.

65
New cards

Pseudo-random Number

Numbers that approximate the properties of random numbers but are generated by a deterministic process.

66
New cards

Integrated Cryptographic System

Combination of various cryptographic techniques to enhance security.

67
New cards

Polygram Substitution Cipher

A substitution cipher that replaces groups of letters with other groups.

68
New cards

Quantum Key Distribution

A secure communication method that uses quantum mechanics to distribute encryption keys.

69
New cards

Keyed Hash Function

A hash function that uses a secret key for additional security.

70
New cards

Eavesdropping

Listening to or intercepting communication without the consent of the parties involved.

71
New cards

Block Cipher

An encryption method that transforms a fixed-size block of plaintext into a ciphertext block.