7-cryptography

0.0(0)
studied byStudied by 6 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Computer Security

The practice of protecting computer systems and data from theft, damage, or unauthorized access.

2
New cards

Cryptography

The science of secure communication through the use of codes and ciphers.

3
New cards

Secure Communication

The need for confidentiality, authentication, and message integrity in communication.

4
New cards

Encryption

The process of converting plaintext into ciphertext to secure the information.

5
New cards

Authentication

Verifying the identity of the sender or receiver in a communication.

6
New cards

Symmetric Encryption

Encryption method where the same key is used for both encryption and decryption.

7
New cards

Asymmetric Encryption

Encryption method where different keys are used for encryption and decryption.

8
New cards

Key Strength

The security level of an encryption algorithm determined by the length and complexity of the key.

9
New cards

Caesar Cipher

A substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

10
New cards

Substitution Cipher

A method of encryption where units of plaintext are replaced with ciphertext according to a regular system.

11
New cards

Transposition Cipher

A method of encryption where the positions of characters in the plaintext are shifted according to a regular system.

12
New cards

Cryptanalysis

The process of analyzing and breaking encryption codes to decipher the original message.

13
New cards

Data Encryption Standard (DES)

A widely used block cipher algorithm for securing data.

14
New cards

Data Encryption Standard (DES)

A symmetric encryption algorithm that uses a 56-bit key and operates on 64-bit blocks of data.

15
New cards

TripleDES

A symmetric encryption algorithm that applies the DES algorithm three times in succession for increased security.

16
New cards

Symmetric Encryption

Encryption method that uses a single key for both encryption and decryption.

17
New cards

Asymmetric Encryption

Encryption method that uses a pair of keys - public key for encryption and private key for decryption.

18
New cards

RSA

A popular asymmetric encryption algorithm developed by Rivest, Shamir, and Adleman, utilizing variable key sizes.

19
New cards

El Gamal

An asymmetric encryption algorithm developed by Taher ElGamal, less common than RSA but used in protocols like PGP.

20
New cards

Man-in-the-middle Attack

A security breach where an attacker intercepts and potentially alters communication between two parties.

21
New cards

Session-Key Encryption

A method that combines symmetric and asymmetric encryption by using asymmetric encryption to securely exchange a symmetric session key.

22
New cards

Pretty Good Privacy (PGP)

Encryption program used for securing emails, combining RSA, TripleDES, and other algorithms.

23
New cards

Key Agreement

A method in asymmetric encryption where two parties generate a shared secret key by exchanging only public keys.

24
New cards

Diffie-Hellman

The first key agreement algorithm allowing secure exchange of keys without prior shared information, invented by Diffie and Hellman.

25
New cards

Authentication

The process of verifying the identity of a user or the integrity of data, often achieved through technologies like message digests, digital signatures, and public key infrastructure.

26
New cards

Authentication Protocols

Set of rules governing data communication related to authentication between server and user.

27
New cards

Transformed Password

Password altered using one-way function before transmission to prevent eavesdropping but not replay.

28
New cards

Challenge-Response

Server sends a random value (challenge) to the client along with authentication request to protect against replay.

29
New cards

Time Stamp

Authentication from client to server must have time-stamp embedded to protect against replay, depending on clock synchronization.

30
New cards

One-Time Password

New password obtained by passing user-password through one-way function n times to protect against replay and eavesdropping.

31
New cards

Kerberos

Authentication service using symmetric key encryption and a key distribution center for user access privilege management.

32
New cards

Personal Tokens

Hardware devices generating unique strings used with passwords for authentication, including different types like storage tokens and synchronous one-time password generators.

33
New cards

Biometrics

Authentication using biological characteristics like fingerprint, voice, handwriting, face, retinal scan, and hand geometry recognition.

34
New cards

Iris Recognition

Authentication method utilizing the unique patterns in people's irises for identification purposes.

35
New cards

Digital Signatures

Data item accompanying digitally encoded message providing source guarantee and proof of data integrity.

36
New cards

Digital Certificates

Signed statement by a trusted party confirming another party's public key ownership, allowing authorization by a root CA.

37
New cards

Cryptanalysis

Practice of analyzing and breaking cryptography, with resistance proportional to key size and methods for safeguarding keys like encryption and smart cards.