Security and Cryptography - Chapter 3: Classical Encryption Techniques

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:42 PM on 3/4/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

21 Terms

1
New cards
block cipher
A type of encryption that operates on data as a sequence of blocks, typically with transformation depending on the current data block, secret key, and content of preceding blocks
2
New cards
brute-force attack
A cryptanalysis technique that involves trying every possible key until the correct one is found
3
New cards
cipher
An algorithm for performing encryption or decryption
4
New cards
ciphertext
The encrypted form of a message
5
New cards
computationally secure
A cipher is computationally secure if the cost of breaking it exceeds the value of the encrypted information or the time required exceeds the useful lifetime of the information
6
New cards
conventional encryption
Traditional encryption method using the same key for encryption and decryption (also known as symmetric encryption)
7
New cards
cryptanalysis
The study of methods to break or bypass cryptographic security without knowing the key
8
New cards
cryptographic system
The entire system used for encryption and decryption, including algorithms, keys, and protocols
9
New cards
cryptography
The art and science of keeping messages secure, including encryption and decryption techniques
10
New cards
digram
A pair of consecutive letters in text
11
New cards
enciphering
The process of converting plaintext into ciphertext
12
New cards
encryption
The process of converting plaintext into ciphertext using a cipher and a key
13
New cards
monoalphabetic substitution cipher
A cipher that replaces each letter in the plaintext with a corresponding letter in the ciphertext, using the same substitution throughout the message
14
New cards
one time pad
A cipher that uses a random key the same length as the message, where the key is used only once
15
New cards
permutation
A rearrangement of the positions of characters in plaintext to produce ciphertext
16
New cards
plaintext
The original, unencrypted message
17
New cards
polyalphabetic substitution cipher
A cipher that uses multiple substitution alphabets to encrypt the plaintext
18
New cards
single-key encryption
Encryption system where the same key is used for both encryption and decryption
19
New cards
stream cipher
A cipher that operates on data as a sequence of bits, with transformation depending on a secret key
20
New cards
symmetric encryption
Encryption where the same key is used for both encryption and decryption
21
New cards
unconditionally secure
A cipher that cannot be broken even with unlimited computational resources (mathematically proven to be secure)