Foundations of Cybersecurity: Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

This flashcard set covers key concepts, terminology, and principles related to cryptography, cybersecurity, and secure communications.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Cryptography

The study of mathematical techniques for providing aspects of information security services.

2
New cards

Cryptanalysis

The study of mathematical techniques for attempting to defeat information security services.

3
New cards

Cryptology

The study of cryptography and cryptanalysis.

4
New cards

Plaintext

The original readable message before encryption.

5
New cards

Ciphertext

The encrypted message that is unreadable without decryption.

6
New cards

Encryption

The process of converting plaintext into ciphertext.

7
New cards

Decryption

The process of converting ciphertext back into plaintext.

8
New cards

Encryption_Key

The key used to encrypt plaintext.

9
New cards

Decryption_Key

The key used to decrypt ciphertext.

10
New cards

Confidentiality

A goal of cryptography ensuring that information is not accessible to unauthorized users.

11
New cards

Integrity

A goal of cryptography ensuring that information cannot be altered without detection.

12
New cards

Authenticity

A goal of cryptography ensuring that the identity of the parties involved in communication is verified.

13
New cards

Non-repudiation

A goal ensuring that a sender cannot deny sending a message.

14
New cards

Pseudo-random number generation

The production of sequences of numbers that approximate the properties of random numbers.

15
New cards

Anonymity

The condition where an individual's identity is concealed.

16
New cards

Zero-knowledge proof

A method by which one party can prove to another that a statement is true without revealing any information beyond the validity of the statement.

17
New cards

Homomorphic encryption

Encryption that allows computation on ciphertexts, generating an encrypted result.

18
New cards

Chosen-plaintext attack

An attack where the attacker can choose arbitrary plaintexts to be encrypted and obtain corresponding ciphertexts.

19
New cards

Chosen-ciphertext attack

An attack where the attacker can choose ciphertexts to be decrypted and obtain corresponding plaintexts.

20
New cards

Kerckhoffs's Principle

The assertion that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

21
New cards

Shannon’s Maxim

The principle that the enemy knows the system.

22
New cards

Brute force attack

An attack that tries all possible keys to decrypt a message.

23
New cards

Monoalphabetic Substitution Cipher

A cipher where each letter in the plaintext is replaced by a letter with a fixed relationship.

24
New cards

Vigenère Cipher

A method of encrypting alphabetic text by using a simple form of polyalphabetic substitution.

25
New cards

Perfect Secrecy

A property of an encryption scheme which ensures that the ciphertext gives no information about the plaintext.

26
New cards

Public key cryptography

A cryptographic system that uses pairs of keys: one public and one private.

27
New cards

Diffie-Hellman

A method of securely exchanging cryptographic keys over a public channel.

28
New cards

RSA (Rivest-Shamir-Adleman)

An asymmetric cryptographic algorithm that uses the mathematical difficulty of factoring large integers as its security base.

29
New cards

Cryptographic hash function

A function that converts an input (or 'message') into a fixed-sized string of bytes.

30
New cards

MD5

A widely used cryptographic hash function that produces a 128-bit hash value.

31
New cards

SHA1

A cryptographic hash function that produces a 160-bit hash value, now considered weak.

32
New cards

X.509

A standard that defines the format of public key certificates.

33
New cards

Certificate Authority (CA)

An entity that issues digital certificates for use by other parties.

34
New cards

Online Certificate Status Protocol (OCSP)

A protocol for checking the revocation status of digital certificates.

35
New cards

Certificate Revocation List (CRL)

A list of digital certificates that have been revoked before their expiration date.

36
New cards

Secure Sockets Layer (SSL)

An early protocol used to secure communications over a computer network.

37
New cards

Transport Layer Security (TLS)

A protocol that ensures privacy between communicating applications and users on the Internet.

38
New cards

Digital Signatures

A mathematical scheme for verifying the authenticity and integrity of a message.