Cryptography & Data Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Man in the Middle Attack

A security breach where an attacker intercepts communication between two parties.

2
New cards

What are the three options for a man in the middle attacker?

View, intercept, repeat.

3
New cards

Cryptography

A form of secret writing used to secure data.

4
New cards

Symmetric Encryption

A type of encryption where the same key is used for both encryption and decryption.

5
New cards

Transposition Ciphers

A method of encryption that involves swapping the order of letters in a fixed pattern.

6
New cards

Caesar Cipher

A specific example of a transposition cipher that shifts letters by a fixed number.

7
New cards

Substitutional Ciphers

A method of encryption where each letter is replaced by another letter.

8
New cards

Frequency Analysis

A method that poses a threat to transposition and substitutional ciphers, analyzing the frequency of letters.

9
New cards

One-Time Pad

An encryption method using a single-use pre-shared key that requires true randomness.

10
New cards

Polyalphabetic Ciphers

Ciphers that use multiple substitution alphabets for encryption.

11
New cards

Kerckhoff's Principle

The principle stating that the security of a cryptographic system should not depend on the secrecy of the algorithm but rather the secrecy of the key.

12
New cards

Asymmetric Encryption

A type of encryption that uses a pair of keys, one public and one private.

13
New cards

Public Key Encryption

A type of asymmetric encryption where a public key is used to encrypt data and a private key is used to decrypt it.