Introduction to Cryptography – Key Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

These vocabulary flashcards cover foundational terms, concepts, algorithms, attack models, and key management issues discussed in the lecture on computer security and cryptography (CSC662). They provide concise definitions to aid revision and exam preparation.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Cryptography

The study and practice of securing information through techniques such as encryption, authentication, digital signatures, one-way functions, hash algorithms, and key management.

2
New cards

Encryption

The process of transforming readable data (plaintext) into an unreadable form (ciphertext) using an algorithm and a key.

3
New cards

Plaintext

The original, readable message or data that is fed into an encryption algorithm.

4
New cards

Ciphertext

The unintelligible output of an encryption algorithm; the encrypted version of the plaintext.

5
New cards

Decryption

The process of converting ciphertext back into its original plaintext using a decryption algorithm and key.

6
New cards

Encryption Key (e)

A secret value used with an encryption algorithm to convert plaintext into ciphertext.

7
New cards

Decryption Key (d)

A secret value used with a decryption algorithm to convert ciphertext back to plaintext; may be identical to or derivable from the encryption key in symmetric systems.

8
New cards

Encryption Algorithm (f)

A mathematical procedure that combines plaintext with an encryption key to produce ciphertext.

9
New cards

Decryption Algorithm (g)

A mathematical procedure that combines ciphertext with a decryption key to recover the original plaintext.

10
New cards

Cryptosystem

The complete specification of an encryption scheme, including message and ciphertext alphabets, keyspace, algorithms, blocking method, and key selection rules.

11
New cards

Keyspace (K)

The set of all possible keys for a given cryptosystem.

12
New cards

Caesar Cipher

A simple substitution cipher that shifts each letter in the plaintext by a fixed number (k) positions in the alphabet.

13
New cards

Substitution Cipher

An encryption method where each symbol in the plaintext alphabet is replaced by a unique symbol in the ciphertext alphabet according to a fixed substitution key.

14
New cards

Permutation Cipher

A cipher in which symbols are permuted; modern block ciphers that treat blocks as permutations belong to this class.

15
New cards

Cryptanalyst (Charles)

An adversary who intercepts encrypted messages and attempts to uncover the plaintext or the keys.

16
New cards

Cryptographer

A person who studies, designs, or analyzes cryptographic systems.

17
New cards

Ciphertext-only Attack

An attack model where the cryptanalyst has only the ciphertexts to work with.

18
New cards

Known-plaintext Attack

An attack in which the cryptanalyst possesses one or more pairs of plaintext and corresponding ciphertext.

19
New cards

Probable-plaintext Attack

An attack where the analyst guesses likely portions of the plaintext and checks them against ciphertext.

20
New cards

Chosen-plaintext Attack

An attack where the cryptanalyst can obtain ciphertexts for plaintexts of their choosing.

21
New cards

Chosen-ciphertext Attack

An attack in which the cryptanalyst can obtain plaintexts corresponding to ciphertexts of their choice.

22
New cards

Exhaustive Key Search (Brute Force)

Trying every possible key in the keyspace until the correct one is found.

23
New cards

Statistical Analysis Attack

Using frequency counts and other statistics of ciphertext symbols to deduce information about the key or plaintext.

24
New cards

Differential Cryptanalysis

A sophisticated attack that examines how small differences in plaintext affect the differences in ciphertext to recover keys.

25
New cards

Diffusion

A property of block ciphers where a small change in plaintext causes widespread, unpredictable changes in ciphertext.

26
New cards

Confusion

A property ensuring that the relationship between key and ciphertext is highly complex, so near-correct keys reveal no information.

27
New cards

Completeness

A block cipher property where every bit of ciphertext depends on every bit of the key, preventing divide-and-conquer attacks.

28
New cards

Symmetric Cryptosystem

A cryptosystem in which the encryption and decryption keys are identical or easily derived from each other.

29
New cards

Session Key

A key with a limited lifetime, often used for a single session or message exchange.

30
New cards

Chaining Keys

A method where a new session key is sent encrypted under the previous session key; vulnerable because compromise of one key reveals subsequent keys.

31
New cards

Random Number Generator (RNG)

A function or device that produces numbers that appear random; critical for generating cryptographic keys.

32
New cards

Pseudo-random Number Generator (PRNG)

An algorithmic RNG whose output is deterministic given its internal state; security relies on keeping the function or seed secret.

33
New cards

One-Time Pad (OTP)

A stream cipher using a random key as long as the message, used only once; offers perfect secrecy.

34
New cards

Perfect Secrecy

A property where ciphertext reveals no information about plaintext; achievable with a properly used one-time pad.

35
New cards

Stream Cipher

An encryption method that combines plaintext with a keystream bit-by-bit, often generated from a short secret key.

36
New cards

Block Cipher

An encryption algorithm that operates on fixed-size blocks of plaintext, producing equal-size blocks of ciphertext.

37
New cards

XOR (Exclusive OR)

A binary operation (⊕) used extensively in cryptography; combining a bit with a key bit: 0⊕k = k, 1⊕k = ¬k.

38
New cards

ASCII

American Standard Code for Information Interchange; maps characters to numerical codes, often represented in binary.

39
New cards

DES (Data Encryption Standard)

A 56-bit key symmetric block cipher with 64-bit blocks, once a U.S. government standard; now considered insecure due to short key length.

40
New cards

Triple DES (3DES)

An enhancement of DES that encrypts, decrypts, and re-encrypts data with three different 56-bit keys, giving an effective key length of 168 bits.

41
New cards

AES (Advanced Encryption Standard)

The current U.S. standard block cipher, based on the Rijndael algorithm, supporting 128-, 192-, or 256-bit keys.

42
New cards

Rijndael

The block cipher algorithm selected as AES; treats data as polynomials and uses 10–14 rounds of substitutions and permutations.

43
New cards

Electronic Codebook (ECB)

A block-cipher mode where each block is encrypted independently; identical plaintext blocks produce identical ciphertext.

44
New cards

Cipher Block Chaining (CBC)

A mode that XORs each plaintext block with the previous ciphertext block before encryption, adding dependency between blocks.

45
New cards

Output Feedback (OFB)

A mode that turns a block cipher into a stream cipher by encrypting iterative feedback blocks to generate a keystream.

46
New cards

Key Generation

The process of creating cryptographic keys, either by the communicating parties or a trusted third party (TTP).

47
New cards

Key Distribution

The secure delivery of cryptographic keys to participants who need them.

48
New cards

Key Storage

The method and location used to keep keys safe after generation.

49
New cards

Key Replacement

The policy and practice of changing keys periodically; frequent changes limit the damage if a key is compromised.