3.1 Cryptography Vocab

0.0(0)
studied byStudied by 1 person
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Plaintext (or cleartext)

an unencrypted message

2
New cards

Ciphertext

an encrypted message

3
New cards

Cryptanalysis

the art of cracking cryptographic systems

4
New cards

encryption keys

used to encrypt or decrypt data

5
New cards

hashing

a process of converting one value into another using a mathematical algorithm. a fixed length of data

6
New cards

salt (salting the hash)

means that a random number of characters are added to the password before the hash is created

7
New cards

digital signatures

verifies that the data is legitimate and provides non-repudiation.

8
New cards

elliptic curve cryptography (ECC)

can generate smaller keys that are more secure than most other methods

9
New cards

Perfect Forward Secrecy

Instead of the same key being used for an entire conversation or session on a website, each transmission is encrypted with a different unique key.

10
New cards

Steganography

the technique of hiding or concealing a file, message, image, or video within another file, message, image, or video

11
New cards

Rivest-Shamir-Adleman (RSA)

Used extensively for creating digital signatures; one of the most commonly used algorithms and helped define the process of using a public key to encrypt data

12
New cards

Digital Signature Algorithm (DSA)

only used for creating digital signatures; uses a different algorithm than RSA but provides the same level of security

13
New cards

Electronic Code Book (ECB)

the simplest mode of operation; each block of plaintext data is encrypted seperately

14
New cards

Cipher Block Chaining (CBC)

similar to ECB except this mode uses an initialization vector (IV). The IV is a starting variable that is XORed with the plaintext of the current block to encrypt the data. The IV for the starting block is a randomly generated value.

15
New cards

Cipher Feedback mode (CFB)

also uses an IV, but instead of using it on the plaintext, the IV is encrypted first. that output is then XORed with the plaintext to create the block of ciphertext

16
New cards

Output Feedback mode (CFB)

This mode is identical to CFB except for the IV used after the first round. the output of the IV encryption is used as the next blocks ciphertext

17
New cards

Counter mode (CTR)

CTR uses a nonce combined with a counter that is encrypted; a nonce is a random string used for all blocks during the encryption process

18
New cards

Galois Counter mode (GCM)

provides both encryption and authentication

19
New cards

Partially homomorphic encryption (PHE)

allows only select simple math functions to be performed; only one math function can be performed an unlimited number of times on the encrypted values

20
New cards

Somewhat homomorphic encryption (SHE)

allows more complex math to occur; can only be performed a limited number of times

21
New cards

Fully homomorphic encryption (FHE)

can handle both simple and advanced math functions being performed an unlimited number of times on the encrypted values. FHE is still in the developmental stage

22
New cards

Dictionary Attack Method

a type of brute-force attack; hacker uses a list of words and phrases to try to guess the decryption key; works well if weak passwords are used

23
New cards

Collision attack

tries to find 2 inputs that produce the same hash value. this type of attack is often used on digital signatures. 

24
New cards

Birthday Attack

combines a collision attack and brute-force attack. this name is taken from the birthday probability math problem.

25
New cards

Downgrade attack

forces the system to use an older, less secure communication protocol.

Explore top flashcards