1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Man in the Middle Attack
A security breach where an attacker intercepts communication between two parties.
What are the three options for a man in the middle attacker?
View, intercept, repeat.
Cryptography
A form of secret writing used to secure data.
Symmetric Encryption
A type of encryption where the same key is used for both encryption and decryption.
Transposition Ciphers
A method of encryption that involves swapping the order of letters in a fixed pattern.
Caesar Cipher
A specific example of a transposition cipher that shifts letters by a fixed number.
Substitutional Ciphers
A method of encryption where each letter is replaced by another letter.
Frequency Analysis
A method that poses a threat to transposition and substitutional ciphers, analyzing the frequency of letters.
One-Time Pad
An encryption method using a single-use pre-shared key that requires true randomness.
Polyalphabetic Ciphers
Ciphers that use multiple substitution alphabets for encryption.
Kerckhoff's Principle
The principle stating that the security of a cryptographic system should not depend on the secrecy of the algorithm but rather the secrecy of the key.
Asymmetric Encryption
A type of encryption that uses a pair of keys, one public and one private.
Public Key Encryption
A type of asymmetric encryption where a public key is used to encrypt data and a private key is used to decrypt it.