Encryption Fundamentals

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover the key concepts and definitions related to encryption, cryptography, and cryptanalysis from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Encryption

The process of converting plaintext into ciphertext to protect the confidentiality of the data.

2
New cards

Cryptanalysis

The study of breaking encryption techniques to read ciphertext without the secret key.

3
New cards

Ciphertext

The coded, unreadable output of the encryption process, produced by applying a cipher to plaintext.

4
New cards

Plaintext

The original, unencrypted message or data that serves as input to the encryption process.

5
New cards

Secret Key

Confidential information required to encrypt or decrypt data, known only to the sender and receiver.

6
New cards

Hashing

A method that protects against unauthorized modification of data, ensuring its integrity.

7
New cards

Cryptography

The broader science of utilizing codes and mathematics to secure information.

8
New cards

Decipher

The process of recovering original plaintext from ciphertext using the correct key.

9
New cards

Kerckhoff's Principle

A cryptosystem's security should rely on the secrecy of the key, not the obscurity of the algorithm.

10
New cards

Shannon's Maxim

The principle that states 'The enemy knows the system,' emphasizing that security lies in the secret key.

11
New cards

Known-Plaintext Attack (KPA)

An attack scenario where the attacker possesses some plaintext and its corresponding ciphertext to deduce the key.

12
New cards

Ciphers

Algorithms that systematically transform data, scrambling it to protect information using mathematical principles.

13
New cards

Digital Rights Management (DRM)

A system that uses encryption to manage access and control the usage of digital content.

14
New cards

Effective File Encryption

Strong file encryption characterized by algorithm strength, key length, and reliable properties.

15
New cards

Editing/Access State

The state where an encrypted file is decrypted for use and re-encrypted before saving.

16
New cards

Transmission State

The state when an encrypted file is moved or sent, maintaining its encrypted form.

17
New cards

Processing State

The state when a file is being created or edited in its original plaintext form.