Unit 4 – Introduction to Cryptography

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering key terms, algorithms, objectives, and applications introduced in the Unit 4 lecture on Cryptography.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

Cryptology

The broad study of secure communication, encompassing cryptography (creating ciphers) and cryptanalysis (breaking them).

2
New cards

Cryptography

The art and science of protecting information by converting plaintext into ciphertext and vice versa; focused on encryption methods.

3
New cards

Cryptanalysis

The study of cryptographic systems to discover weaknesses or recover information, i.e., the art of breaking ciphers.

4
New cards

Confidentiality

Cryptographic objective that ensures only intended recipients can read the message.

5
New cards

Integrity

Assurance that data has not been altered during storage or transmission.

6
New cards

Authentication

Verification of the identity of a sender or device.

7
New cards

Non-repudiation

Proof that a sender actually sent a message, preventing denial of involvement.

8
New cards

Plaintext

Readable data ready for encryption by a cipher.

9
New cards

Cleartext

Unencrypted, human-readable data; may be encoded but not encrypted.

10
New cards

Cipher

Algorithm that converts plaintext into ciphertext using a key.

11
New cards

Key

Secret value that governs transformation rules in a cipher; longer keys usually give stronger security.

12
New cards

Encryption

Process of disguising plaintext as ciphertext using a cipher and key.

13
New cards

Decryption

Process of reverting ciphertext back to plaintext with the appropriate key.

14
New cards

Adversary

Any unauthorized or malicious entity attempting to compromise a cryptographic system.

15
New cards

Substitution Cipher

Cipher that replaces each element of plaintext with another element (e.g., Caesar, Playfair).

16
New cards

Transposition Cipher

Cipher that rearranges the order of plaintext characters (e.g., Rail Fence).

17
New cards

Scytale Cipher

Ancient Spartan transposition cipher using a parchment strip wrapped around a rod.

18
New cards

Kamasutra Cipher

4th-century BCE Indian substitution cipher described in the Kamasutra for private messages.

19
New cards

Caesar Cipher

Classical substitution cipher shifting letters by a fixed number, famously by 3.

20
New cards

Playfair Cipher

5×5 grid substitution cipher encrypting text in letter pairs (bigrams).

21
New cards

Rail Fence Cipher

Transposition cipher writing text in a zigzag pattern across rails and reading row-by-row.

22
New cards

Symmetric Encryption

Encryption that uses the same secret key for both encryption and decryption.

23
New cards

Asymmetric Encryption

Encryption that uses a public key for encryption and a separate private key for decryption (or vice versa).

24
New cards

Steganography

Technique of hiding a secret message inside another file (image, audio, video) so its presence is concealed.

25
New cards

Hash Function

One-way algorithm that converts data into a fixed-length hash (message digest).

26
New cards

Block Cipher

Symmetric cipher that encrypts fixed-size blocks of data (64 or 128 bits).

27
New cards

Stream Cipher

Symmetric cipher that encrypts data one byte or bit at a time for continuous streams.

28
New cards

Data Encryption Standard (DES)

Legacy 56-bit key block cipher; considered insecure today.

29
New cards

Triple DES (3DES)

Applies DES three times for more security; officially retired in 2023.

30
New cards

Advanced Encryption Standard (AES)

Widely used block cipher with 128-bit blocks and key sizes of 128/192/256 bits.

31
New cards

SEAL

Software-Optimized Encryption Algorithm; fast 160-bit-key stream cipher alternative to AES.

32
New cards

RC4

Rivest stream cipher once common for web traffic; now considered insecure.

33
New cards

Diffie-Hellman (DH)

Asymmetric algorithm enabling two parties to agree on a shared secret over an insecure channel.

34
New cards

Elliptic Curve Cryptography (ECC)

Family of asymmetric techniques using elliptic curves, providing strong security with shorter keys.

35
New cards

ElGamal

Asymmetric encryption scheme based on DH; produces ciphertext about twice the size of plaintext.

36
New cards

Digital Signature Algorithm (DSA)

Algorithm specified by DSS for creating digital signatures; based on ElGamal.

37
New cards

RSA

Widely used public-key algorithm relying on the difficulty of factoring large integers.

38
New cards

Embedded Data (Steganography)

The actual secret message hidden inside a cover file.

39
New cards

Cover File

Normal-looking carrier (image/audio/video) used to hide embedded data in steganography.

40
New cards

Stego File

Final file containing the hidden data after steganographic embedding.

41
New cards

Stego Key

Secret that controls how data is embedded or extracted in steganography.

42
New cards

Message Digest

Fixed-length output (hash value) produced by a hash function; digital fingerprint of data.

43
New cards

MD5

128-bit hash function by Ron Rivest; fast but vulnerable to collisions, legacy only.

44
New cards

SHA-1

160-bit hash from NSA (1995); collision-prone and no longer recommended for security use.

45
New cards

SHA-2

Family including SHA-224/256/384/512; currently trusted and widely deployed.

46
New cards

SHA-3

Next-generation hash family (Keccak) introduced by NIST in 2012, resistant to known attacks.

47
New cards

Keccak

Underlying sponge construction algorithm used in SHA-3.

48
New cards

Salting

Adding a random value to each password before hashing to defeat rainbow table attacks.

49
New cards

Rainbow Table Attack

Precomputed table of hash values used to reverse weakly protected hashes; mitigated by salting.

50
New cards

Digital Signature

Cryptographic technique that binds a signer to data by hashing it and encrypting the hash with the signer’s private key.

51
New cards

Digital Certificate

X.509 file that binds a public key to an entity’s identity, signed by a Certificate Authority.

52
New cards

Certificate Authority (CA)

Trusted organization that issues, signs, and manages digital certificates.

53
New cards

Pretty Good Privacy (PGP)

Hybrid cryptosystem combining symmetric encryption (for data) with asymmetric encryption (for key exchange and authentication).