1/32
Flashcards covering key terms and definitions from Modules 5 to 8 on Cryptography and Network Security.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cryptography
The science of securing communication through encoding information.
Cryptanalysis
The science of breaking cryptographic codes and ciphers.
Plaintext
The original readable message before encryption.
Ciphertext
The encrypted version of the plaintext.
Code
Replaces entire words or phrases in a message.
Cipher
Replaces individual letters or bits in a message.
Algorithm
A set of rules or steps used to encrypt or decrypt information.
Key
A value that works with an algorithm to encrypt or decrypt data.
Keyspace
The total number of possible keys in an algorithm.
Encryption
Converts plaintext to ciphertext.
Decryption
Converts ciphertext back to plaintext.
Symmetric Cryptography
A method using the same key for both encryption and decryption.
Asymmetric Cryptography
A method using a public key for encryption and a private key for decryption.
Hashing
A one-way function that converts data into a fixed-length string (digest).
Substitution Cipher
Replaces elements of plaintext with ciphertext.
Transposition Cipher
Reorders characters without changing them.
Product Cipher
Combines both substitution and transposition ciphers.
Brute Force Attack
Trying all possible key combinations until the correct one is found.
Dictionary Attack
Uses a list of common passwords to crack a password.
Side-Channel Analysis
Attacks based on physical implementation, like timing or power consumption.
Digital Signature
Provides integrity and non-repudiation to a message.
MAC Function
Message Authentication Code; verifies data integrity and authenticity.
Hash Collision
When two different inputs produce the same hash output.
HMAC
A MAC based on a hash function and a secret key.
Quantum Computing Impact on Cryptography
Could break current algorithms like RSA by factoring large primes quickly.
Steganography
Hiding data within other files, such as images.
Multi-Factor Authentication (MFA)
Using two or more factors to authenticate identity.
Access Control
Mechanisms to restrict access to resources.
Principle of Least Privilege
Users are granted the minimum level of access necessary.
NAT (Network Address Translation)
Allows private IPs to access the internet.
Three-Way Handshake
SYN → SYN-ACK → ACK; a method to establish a TCP connection.
Firewall
A device or software that filters network traffic.
proper format of socket
ip address, port