Symmetric Encryption

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terminology related to symmetric encryption, its functionalities, and various types of attacks.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

26 Terms

1
New cards

Symmetric Encryption

A type of encryption where the same key is used for both encrypting and decrypting data.

2
New cards

Block Cipher

An encryption method that processes data in fixed-size blocks.

3
New cards

Stream Cipher

An encryption method that encrypts data one bit or byte at a time.

4
New cards

Active Attack

An attempt to alter system resources or affect their operation.

5
New cards

Passive Attack

An attempt to learn or make use of information from a system without affecting system resources.

6
New cards

Man-in-the-Middle Attack

An attack where an attacker intercepts communication between two parties, capturing unencrypted data.

7
New cards

Plaintext

The original, unencrypted form of a message.

8
New cards

Ciphertext

The encrypted form of a message.

9
New cards

Key

A piece of information used to encrypt or decrypt a message.

10
New cards

Key Space

The set of all possible keys that can be used in encryption.

11
New cards

Caesar Cipher

A type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

12
New cards

Frequency Analysis

A technique used to break ciphers by studying the frequency of letters or groups of letters in ciphertext.

13
New cards

Kerckhoff’s Principle

The principle that a cryptosystem should remain secure even if everything about the system is known, except for the key.

14
New cards

Security through Obscurity

The idea that a system is secure because its design or implementation is not known.

15
New cards

Confusion

A property of ciphers that makes it difficult to determine relationships between key bits and ciphertext bits.

16
New cards

Diffusion

A property of ciphers where a small change in plaintext results in a large change in ciphertext.

17
New cards

Enigma Machine

A cipher device used by the Germans during World War II, known for its complex encryption.

18
New cards

DES (Data Encryption Standard)

A symmetric-key algorithm for the encryption of digital data, now considered outdated.

19
New cards

AES (Advanced Encryption Standard)

A symmetric encryption standard that replaced DES, widely used and considered secure.

20
New cards

XOR Operation

A binary operation used in cryptography that outputs true or 1 only when one of its inputs is true.

21
New cards

Brute Force Attack

A method of defeating a cryptographic scheme by systematically trying all possible keys.

22
New cards

Asymmetric Encryption

A type of encryption where different keys are used for encrypting and decrypting data; one is public, and one is private.

23
New cards

Public Key

In asymmetric encryption, the key that can be freely distributed and is used to encrypt messages or verify digital signatures.

24
New cards

Private Key

In asymmetric encryption, the secret key that is kept by the owner and is used to decrypt messages or create digital signatures.

25
New cards

Cryptographic Hash Function

A mathematical algorithm that maps data of arbitrary size to a bit array of fixed size (a 'hash' or 'digest') designed to be a one-way function.

26
New cards

Digital Signature

A mathematical scheme for verifying the authenticity of digital messages or documents, often used to ensure integrity and non-repudiation.