fundamentals, secret key encryption

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

asymmetric encryption

involves using two keys, one key (public key) to encrypt data and the other key (private key) to decrypt the encrypted data; also called public key encryption

2
New cards

symmetric encryption

invloves using one shared key to encrypt and decrypt data; also called secret key encryption

3
New cards

block encryption

involves breaking down plaintext messages into fixed size blocks before converting them into ciphertext using a key

4
New cards

stream encryption

an encryption algorithm that breaks a plaintext message down into single bits and encrypts 1 bit of plaintext at a time

5
New cards

rainbow attack

invloves mapping the hashed values back to the original message from a precomputed lookup “rainbow” table

6
New cards

dictionary attack

the process of systematically entering every word in a dictionary as a password to see if the hashed code matches the one in the password file

7
New cards

cipher block chaining

involves adding an initialization vector to the first block of the plaintext and combining the output with the next plaintext block until the process is repeated through the full chain of blocks

8
New cards

man in the middle (MITM) attack

when an attacker positions himself in a conversation between two parties in order to eavesdrop or impersonate on of the parties

9
New cards

salting

the process of adding an initialization vector to the ciphering process to change its operation and ensure that the ciphertext does not give the original plaintext when played back

10
New cards

entropy

measuring the amount of unpredictability, and in encryption it relates to the degree of uncertainty of the encryption process