Corporate Cybersecurity – Chapter 3: Cryptography

0.0(0)
studied byStudied by 3 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering major terms and definitions from Chapter 3 (Cryptography) of Corporate Cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Cryptography

Use of mathematical operations to protect messages traveling between parties or stored on a computer.

2
New cards

Confidentiality

Assurance that intercepted communications cannot be read by unauthorized parties.

3
New cards

Encryption

cryptographic process that turns plaintext into a seemingly random stream of bits called ciphertext.

4
New cards

Plaintext

Original, readable form of a message before encryption.

5
New cards

Ciphertext

Seemingly random bit stream produced after encryption.

6
New cards

Cipher

Specific mathematical algorithm used for encryption and decryption.

7
New cards

Key

Random string (40–4,000 bits) fed into a cipher; must be kept secret.

8
New cards

Kerckhoffs’ Law

Security of encryption should rely on the secrecy of keys, not algorithms.

9
New cards

Cryptanalysis

Science and practice of breaking encryption.

10
New cards

Brute-Force Key Cracking

Attempting every possible key until the correct one is found.

11
New cards

Substitution Cipher

Cipher that replaces each letter/bit with another.

12
New cards

Transposition Cipher

Cipher that rearranges the order of letters/bits without altering them.

13
New cards

Code

System that substitutes complete words or phrases, not individual letters or bits.

14
New cards

Symmetric Key Encryption

Both parties encrypt/decrypt with the same shared key.

15
New cards

RC4

Stream cipher; historically common but now discouraged due to weaknesses.

16
New cards

DES

Data Encryption Standard; 56-bit key symmetric block cipher, now obsolete.

17
New cards

3DES

Triple DES; applies DES three times for stronger security.

18
New cards

AES

Advanced Encryption Standard; modern symmetric block cipher (128/192/256-bit keys).

19
New cards

Twofish

Symmetric cipher created by Bruce Schneier; AES finalist.

20
New cards

IDEA

International Data Encryption Algorithm; widely used in Europe.

21
New cards

SEED

Symmetric cipher standardized in South Korea.

22
New cards

GOST

Russian symmetric encryption standard.

23
New cards

Camellia

Japanese symmetric block cipher with AES-like strength.

24
New cards

Cryptographic System

Packaged set of cryptographic protections (confidentiality, authentication, integrity).

25
New cards

Cipher Suite

Specific set of algorithms (authentication, key exchange, confidentiality, integrity) chosen during negotiation in a cryptographic system such as TLS.

26
New cards

Supplicant

Entity that seeks to prove its identity during authentication.

27
New cards

Credentials

Proofs of identity such as passwords or digital certificates.

28
New cards

Verifier

Entity that checks credentials presented by a supplicant.

29
New cards

Hashing

One-way calculation that converts data of any length into a fixed-length digest.

30
New cards

Hash

Fixed-length output produced by a hashing algorithm.

31
New cards

MD5

128-bit hashing algorithm now considered insecure.

32
New cards

SHA-1

160-bit hashing algorithm; also no longer secure.

33
New cards

SHA-2

Family of secure hash algorithms (SHA-224, SHA-256, SHA-384, SHA-512).

34
New cards

MS-CHAP

Microsoft Challenge Handshake Authentication Protocol for initial authentication.

35
New cards

Public Key Encryption

Asymmetric method where each party has a public and private key pair.

36
New cards

Public Key

Key openly distributed for others to encrypt messages or verify signatures.

37
New cards

Private Key

Secret key kept by owner to decrypt messages or create digital signatures.

38
New cards

Symmetric Session Key

Temporary symmetric key generated for a single communication session.

39
New cards

Diffie-Hellman Key Exchange

Public-key method that securely agrees on a symmetric session key.

40
New cards

Man-in-the-Middle (MITM) Attack

Attacker intercepts and relays messages between parties without detection.

41
New cards

Replay Attack

Attacker captures and retransmits a valid message to gain unauthorized access.

42
New cards

Electronic Signature

Mechanism that provides authentication and message integrity.

43
New cards

Digital Signature

Public-key based electronic signature offering strong, nonrepudiable authentication.

44
New cards

HMAC

Key-Hashed Message Authentication Code; cheaper alternative to digital signatures for authentication and integrity.

45
New cards

Certificate Authority (CA)

Trusted organization that issues and digitally signs digital certificates.

46
New cards

Digital Certificate

File containing a subject’s identity and public key, signed by a CA.

47
New cards

Nonrepudiation

Inability of a sender to deny having sent a message; ensured by digital signatures.

48
New cards

Quantum Key Distribution

Quantum method of sending a one-time key where eavesdropping is detectable.

49
New cards

Quantum Key Cracking

Use of quantum computing to test many keys simultaneously, threatening current key lengths.

50
New cards

Virtual Private Network (VPN)

Cryptographic system providing secure communication over an untrusted network.

51
New cards

TLS (Transport Layer Security)

Transport-layer cryptographic protocol commonly securing web traffic and some VPNs.

52
New cards

IPsec

Network-layer cryptographic protocol suite; considered the “gold standard” for security.

53
New cards

IPsec Transport Mode

End-to-end IPsec protection between hosts; high setup cost and firewall issues.

54
New cards

IPsec Tunnel Mode

Protection only between IPsec gateways; lower cost and firewall friendly.

55
New cards

Security Association (SA)

Agreement on security methods and options between two IPsec entities.