operation finds the remainder of a division, used in ceasar and affine cipher
4
New cards
substitution cipher
when each letter in an alphabet is replaced with a different character or symbol
5
New cards
encryption key
A string of characters used as a parameter that determines the output of an encryption algorithm
6
New cards
private/symmetric key encryption
an encryption method where the sender and receiver share a single private key
7
New cards
cipher
an algorithm used for encryption or decryption
8
New cards
cryptography
The science and art of delivering a message securely and confidentially
9
New cards
plaintext
The original message that needs to be encrypted
10
New cards
public/asymmetric key encryption
an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner.
11
New cards
ALGORITHM
steps needed to accomplish a task
12
New cards
What is the difference between “Sign and Encrypt”, “Encrypt” and “Sign”?
With encrypt, you’re using a public key and the receiver will have to use their private key to decrypt the message. With sign, the opposite of encrypt is happening, I’ll be using my private key and the receiver will be using my public key.
13
New cards
one-way function
a math function that is easy to do but very hard to undo.
14
New cards
statements that are true about **symmetric** encryption.
It has a large key space
15
New cards
statements that are true about **symmetric** encryption.
It exchanges one shared key.
16
New cards
statements that are true about **symmetric** encryption.
It uses a relatively simple and fast algorithm.
17
New cards
statements that are true about **asymmetric** encryption.
It uses a relatively smaller key space.
18
New cards
statements that are true about **asymmetric** encryption.
It is more secure because of the privately held keys.
19
New cards
statements that are true about **asymmetric** encryption.
It is relatively slow due to its more complex calculations.
20
New cards
statements that are true about **asymmetric** encryption.
It can be used for encrypting and signing a message.
21
New cards
Data at rest
Data that’s stored somewhere else; ex: bank account
22
New cards
Data in transit
data that’s being transferred between applications,host or around the network; ex: an email on its way to a recipient; the results coming back from an internet search
23
New cards
Data in process
data that is manipulated by an application; ex: A website calculating the tax of an item
24
New cards
TRUSTED PLATFORM MODULE
mechanism that provides secure encryption for a device
25
New cards
How do recovery keys and hash values differ
Recovery keys are created by the operating system to store the key to the drive, in the event a password is lost. \n Hash values are created at encryption time and represent passwords that control access to the encrypted data.
26
New cards
Disks
physical drives inside of a pc
27
New cards
volume
the accessible storage area on a hard drive or disk
28
New cards
Partition
a part of a volume that's formatted for the operating system to use as a storage area
29
New cards
container
a file that has other data and acts like a drive
30
New cards
HASH
a computational process that converts data of varying size to a fixed-size.
31
New cards
CRYPTOCURRENCY
A digital cash system
32
New cards
what can be encrypted to secure data at rest?
* Entire disk drives
33
New cards
what can be encrypted to secure data at rest?
* Portions of disk drives, such as containers
34
New cards
what can be encrypted to secure data at rest?
* Individual files
35
New cards
what can be encrypted to secure data at rest?
Application specific documents
36
New cards
what happens when you mount vs dismount the container.
When you mount it, the drive is visible in file explorer, but when you dismount it, it is no longer visible
37
New cards
With all of these historical examples of writing, what are the limitations?
* Today, computer algorithms could quickly discover patterns and find the hidden data.
38
New cards
With all of these historical examples of writing, what are the limitations?
* Messages and keys could be discovered by outsiders.
39
New cards
covert
messages that we want to keep hidden
40
New cards
overt
messages that you don’t mind if people can see
41
New cards
SUBSTITUTION STEGANOGRAPHY
Substitution just replaces data that isn’t important or redundant information with the covert data.
42
New cards
ALTERNATE DATA STREAMS
Files can be separated into multiple resources, so you can attach an icon to a file and the icon will be stored with the file.