Exam 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Character Substitution

A cipher technique where each character in the plaintext is replaced with another character according to a rule or key.

2
New cards

ROT13

A simple substitution cipher that shifts each letter by 13 places in the alphabet.

3
New cards

Substitution Cipher

Replaces each letter of the plaintext with another letter based on a permutation of the alphabet.

4
New cards

Two-Letter Substitution – Playfair Cipher

A digraph substitution cipher that encrypts pairs of letters using a 5x5 matrix of the alphabet.

5
New cards

Kerckhoffs’s Principle

A foundational principle in cryptographic system design emphasizing security should rely solely on key secrecy.

6
New cards

Stream Cipher

Encrypts plaintext one bit or byte at a time, typically by XORing it with a keystream.

7
New cards

Block Cipher

Encrypts fixed-size blocks of plaintext (e.g., 64 or 128 bits) by mixing it with a key.

8
New cards

Ciphertext-Only Attack (COA)

The attacker has access only to ciphertexts, not the corresponding plaintext.

9
New cards

Known-Plaintext Attack (KPA)

The attacker has both plaintext and matching ciphertext samples.

10
New cards

Chosen-Plaintext Attack (CPA)

The attacker can choose arbitrary plaintexts and obtain their ciphertexts.

11
New cards

Chosen-Ciphertext Attack (CCA)

The attacker can choose ciphertexts and obtain their decrypted plaintexts.

12
New cards

Block Ciphers

A method of encrypting data in fixed-size blocks (e.g., 64, 128 bits), rather than bit-by-bit or character-by-character.

13
New cards

DES (Data Encryption Standard)

A symmetric block cipher developed in the 1970s using 64-bit blocks and a 56-bit key.

14
New cards

3DES (Triple DES)

An enhancement of DES applying it three times to increase security.

15
New cards

Brute Force

Trying every possible key until the correct one is found.

16
New cards

Birthday Attack

Targets hash functions by exploiting probability of hash collisions (two inputs with the same output).

17
New cards

Meet-in-the-Middle Attack

Used against encryption schemes like double DES by precomputing encryptions from one end and decryptions from the other.

18
New cards

Salting

A unique, random value added to passwords before hashing to prevent use of rainbow tables.

19
New cards

Digital Signature

A cryptographic technique to verify the authenticity and integrity of a message.

20
New cards

Integrity

Assurance that a message has not been changed in transit or storage.

21
New cards

Public-Key Encryption

Asymmetric method using a public/private key pair.

22
New cards

RSA (Rivest-Shamir-Adleman)

A public-key encryption algorithm based on factoring large integers.

23
New cards

SHA-2 / SHA-3

Secure hash functions used for file fingerprinting and integrity checking.

24
New cards

Diffie-Hellman (DH)

A key exchange method to securely derive a shared secret over an insecure channel.

25
New cards

OTR (Off-the-Record Messaging)

A cryptographic protocol for instant messaging that provides encryption, authentication, forward secrecy, and deniability.

26
New cards

Forward Secrecy (Perfect Forward Secrecy)

A security feature that ensures past encrypted communications remain secure even if the long-term keys are later compromised.