Security and Cryptography - Chapter 3: Classical Encryption Techniques
Studied by 0 people
0.0(0)
LearnA personalized and smart learning plan
Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 20
There's no tags or description
Looks like no one added any tags here yet for you.
21 Terms
1
block cipher
A type of encryption that operates on data as a sequence of blocks, typically with transformation depending on the current data block, secret key, and content of preceding blocks
New cards
2
brute-force attack
A cryptanalysis technique that involves trying every possible key until the correct one is found
New cards
3
cipher
An algorithm for performing encryption or decryption
New cards
4
ciphertext
The encrypted form of a message
New cards
5
computationally secure
A cipher is computationally secure if the cost of breaking it exceeds the value of the encrypted information or the time required exceeds the useful lifetime of the information
New cards
6
conventional encryption
Traditional encryption method using the same key for encryption and decryption (also known as symmetric encryption)
New cards
7
cryptanalysis
The study of methods to break or bypass cryptographic security without knowing the key
New cards
8
cryptographic system
The entire system used for encryption and decryption, including algorithms, keys, and protocols
New cards
9
cryptography
The art and science of keeping messages secure, including encryption and decryption techniques
New cards
10
digram
A pair of consecutive letters in text
New cards
11
enciphering
The process of converting plaintext into ciphertext
New cards
12
encryption
The process of converting plaintext into ciphertext using a cipher and a key
New cards
13
monoalphabetic substitution cipher
A cipher that replaces each letter in the plaintext with a corresponding letter in the ciphertext, using the same substitution throughout the message
New cards
14
one time pad
A cipher that uses a random key the same length as the message, where the key is used only once
New cards
15
permutation
A rearrangement of the positions of characters in plaintext to produce ciphertext
New cards
16
plaintext
The original, unencrypted message
New cards
17
polyalphabetic substitution cipher
A cipher that uses multiple substitution alphabets to encrypt the plaintext
New cards
18
single-key encryption
Encryption system where the same key is used for both encryption and decryption
New cards
19
stream cipher
A cipher that operates on data as a sequence of bits, with transformation depending on a secret key
New cards
20
symmetric encryption
Encryption where the same key is used for both encryption and decryption
New cards
21
unconditionally secure
A cipher that cannot be broken even with unlimited computational resources (mathematically proven to be secure)