Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Cryptography

The science of encrypting and hiding information.

2
New cards

Cyphers

Methods of moving letters around or jumbling them in a different sequence.

3
New cards

Cryptanalysis

The process of analyzing available information to retrieve the encrypted message.

4
New cards

Differential cryptanalysis

Analyzing differences between input plaintext and output ciphertext to determine the key used.

5
New cards

Linear cryptanalysis

A method that uses plaintext and ciphertext together to deduce the encryption key.

6
New cards

Cryptographic operations

Actions to hide data, resist forgery, prevent unauthorized changes, enforce policy, and exchange keys.

7
New cards

Algorithm and key

Components used to perform cryptographic operations.

8
New cards

Encryption

A cryptographic operation that converts plaintext into ciphertext.

9
New cards

Hashing

A process that takes input and reduces it to a unique, irreversible number known as a hash.

10
New cards

Digital signatures

A cryptographic technique for verifying the authenticity and integrity of a message.

11
New cards

Substitution

The replacement of items with different items in the encryption process.

12
New cards

Transposition

The rearrangement of the order of items in the encryption process.

13
New cards

Keyspace

The set of all possible key values for a cryptographic system.

14
New cards

Diffusion

A property where a change in plaintext results in multiple changes in ciphertext.

15
New cards

Confusion

The randomization of output where each ciphertext character relies on various parts of the key.

16
New cards

Obfuscation

The process of masking an item to make it unreadable but still usable.

17
New cards

Perfect forward secrecy

A property that ensures a derived key remains secure even if the originating key is compromised.

18
New cards

Security through obscurity

A security principle that relies on keeping the design or implementation secret.

19
New cards

Transposition cipher

A cipher that changes the order of letters with the same letters.

20
New cards

Plaintext

The original unencrypted data.

21
New cards

Ciphertext

The output data that has been encrypted.

22
New cards

Algorithm

A step-by-step procedure for solving a problem in a finite number of steps.

23
New cards

Symmetric algorithm

An algorithm where the same key is used for both encryption and decryption.

24
New cards

Asymmetric algorithm

An algorithm that uses a pair of keys (public and private) for encryption and decryption.

25
New cards

Key

A special piece of data used in the encryption and decryption processes.

26
New cards

Exclusive OR (XOR)

A bitwise function applied to data that relies on the secrecy of the key.

27
New cards

Shift cipher

A cipher where a letter is shifted a specified number of places in the alphabet.

28
New cards

ROT 13

A letter rotation of 13 positions in the alphabet.

29
New cards

Vigenere cipher

A polyalphabetic substitution cipher that depends on a password.

30
New cards

Key management

The processes of exchange, storage, safeguarding, and revocation of keys.

31
New cards

Salting

A technique that provides sufficient input for low entropy items to hash functions.

32
New cards

Hashing function

A mathematical function that produces a unique output for a given input.

33
New cards

One way function

A function where retrieving the plaintext from ciphertext is not feasible.

34
New cards

Hash

The output of a hashing algorithm for a specific input.

35
New cards

MAC (Message Authentication Code)

A code used to verify the integrity and authenticity of a message.

36
New cards

HMAC

Hash-based message authentication code, a specialized type of MAC.

37
New cards

Collision attack

A method where an attacker finds two different inputs that produce the same hash value.

38
New cards

Message digest

The output hash created from data input into a hashing algorithm.

39
New cards

MD2

A hashing algorithm that produces a 128-bit hash from input data of any length.

40
New cards

MD4

A fast hashing algorithm that is vulnerable to attacks.

41
New cards

MD5

A hashing algorithm known for its vulnerability to collision attacks.

42
New cards

SHA (Secure Hash Algorithm)

A set of hash algorithms designed by NIST.

43
New cards

SHA-1

A hashing function that produces a 160-bit hash and is used in DSA.

44
New cards

SHA-2

An improved hashing algorithm with no known collision attacks against SHA-256.

45
New cards

SHA-3

A hashing algorithm different from previous versions, resistant to known attacks.

46
New cards

RIPEMD

A hashing function designed for integrity evaluation, known for collision problems.

47
New cards

DES (Data Encryption Standard)

A symmetric block cipher that segments data into specified block sizes.

48
New cards

3DES

An encryption method that applies the DES algorithm three times with three keys.

49
New cards

AES

An advanced encryption standard that supports message authentication.

50
New cards

RC4

A fast stream cipher that encrypts plaintext bit by bit.

51
New cards

Blowfish

A block cipher that encrypts a 64-bit input block into 32-bit words.

52
New cards

Twofish

A block cipher using 128-bit blocks and variable length keys.

53
New cards

ECB (Electronic Codebook)

The simplest cipher operation mode, encrypting each block separately.

54
New cards

CBC (Cipher Block Chaining)

A block mode where each block is XORed with the previous ciphertext before encryption.

55
New cards

Counter Mode (CTM)

Uses a counter function to generate a nonce for each block encryption.