Cryptography and Security Terminology

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts, terms, and definitions related to cryptography and security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Double Transposition Cipher

Employs both Confusion and Diffusion principles in its design.

2
New cards

Caesar Cipher

A simple substitution cipher that shifts letters by a specified amount.

3
New cards

Security of a Cryptosystem

A cryptosystem is secure if the best-known attack requires as much work as an exhaustive key search.

4
New cards

Confidentiality

Prevents unauthorized access to information.

5
New cards

Integrity

Ensures data remains unchanged during storage or transmission.

6
New cards

XOR Operation

A binary operation that outputs true or '1' only when the inputs differ.

7
New cards

One-Time Pad

A provably secure cryptosystem that requires a key as long as the message.

8
New cards

Kerckhoffs' Principle

A cryptosystem should be secure even if the algorithm is public; only the key must remain secret.

9
New cards

Availability

Ensures that information and resources are accessible to authorized users when needed.

10
New cards

Additives in Codebook Ciphers

Used to obfuscate statistical information in the encrypted message.

11
New cards

Impracticality of One-Time Pad

The key length is the same as the message, making it impractical to transmit.

12
New cards

F Function in Cryptography

A function that typically applies an operation, such as XOR, between the right half of plaintext and a key.

13
New cards

Electronic Codebook (ECB) Mode

A block cipher mode that encrypts identical plaintext blocks into identical ciphertext blocks.

14
New cards

RC4

A type of stream cipher used in various encryption protocols.

15
New cards

Counter (CTR) Mode

A block cipher mode that allows a block cipher to act as a stream cipher.

16
New cards

Vulnerability of DES

DES is vulnerable due to its short key length of 56 bits.

17
New cards

Message Authentication Code (MAC)

Designed to protect the integrity of messages.

18
New cards

Symmetric Key Crypto Advantage

Symmetric Key Crypto is much faster than Public Key Crypto.

19
New cards

Diffie-Hellman Key Exchange

A method for securely exchanging cryptographic keys over a public channel.

20
New cards

Non-repudiation

Assures that someone cannot deny the validity of their digital signature.

21
New cards

Public Key Crypto

Can achieve non-repudiation and allows for confidentiality in message transmission.

22
New cards

Digital Certificate

A document that binds the identity of an entity to a public key.

23
New cards

Value of x in mod arithmetic

To solve 5x mod 17 = 1, find a value of x that satisfies the equation.

24
New cards

Existence of Private Key

A private key does not exist in a digital certificate; only the public key is present.

25
New cards

RSA

An asymmetric cryptographic algorithm used in public key encryption.

26
New cards

SHA-256

A cryptographic hash function that produces a 256-bit hash.

27
New cards

Properties of Cryptographic Hash Functions

Include being easy to compute and infeasible to reverse.

28
New cards

Integrity of Messages

Can be protected using cryptographic hash functions combined with symmetric keys.

29
New cards

Probability in Hash Functions

The expected probability of hash collisions increases with the length of the output.

30
New cards

MD5 Usefulness

Can be used for detecting accidental error in data integrity.

31
New cards

Output Requirements in Hash Functions

A typical output should have a hash length double that of the key size in symmetric key crypto.

32
New cards

HMAC Verification

Alice sends h(M, K) to verify the integrity of message M.

33
New cards

Digital Signature of Hash Value

Provides an efficient way to ensure the integrity of large messages.

34
New cards

Avalanche Effect

A change to one bit of input should affect about half of the output bits.

35
New cards

Capabilities of Crypto Hash Functions

Include data corruption detection and message fingerprinting.

36
New cards

Fraud Rate in Biometric Recognition

Occurs when an unauthorized user is mistakenly authenticated.

37
New cards

Password Verification with Salts

Both the password hash and salt values are stored in the password file.

38
New cards

Lowest Equal Error Rates

The iris scan has the lowest equal error rates among biometric methods.

39
New cards

Web Cookies Storage

Stored on the user's machine.

40
New cards

Mutual Authentication Protocol

Involves the exchange of messages using a symmetric key and nonces.

41
New cards

Perfect Forward Secrecy

Ensures that the compromise of long-term keys does not compromise past session keys.

42
New cards

Nonce Usage

Nonces enhance security by providing freshness in responses.

43
New cards

Password Verification Method

Utilizes cryptographic hash functions to ensure security.

44
New cards

'Something You Are' Authentication

Biometric characteristics like fingerprints and iris scans.

45
New cards

Challenges in Network Authentication

Include observational attacks, replay attacks, and active attacks.

46
New cards

Authentication vs. Authorization

Authentication verifies identity, while authorization determines permissions.

47
New cards

Potential Security Threats in Protocols

Includes possible capture of passwords by attackers.

48
New cards

Two-Factor Authentication

Combines something you know (password) with something you have (identification code).