Cybersecurity 20-23

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:58 AM on 4/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

59 Terms

1
New cards

cryptography

scrambling data so that it looks like babble to anyone except those who know the trick to decoding it.

2
New cards

Algorithim (aka cipher)

a precise set of instructions that tells programs how to scramble and unscramble data.

3
New cards

Plaintext

decrypted or unencrypted data

4
New cards

ciphertext

data that has been encypted

5
New cards

cyryptanalysis

attempting to break a cryptographic system and return the encrypted message to plaintext.

6
New cards

Encryption with substitution

replacement of a character with different charactermo

7
New cards

monoalphabetic ciphers

same letter is used as a substitute every time. like a is used for z for the entire chapter.

8
New cards

what is transposition

changing the order of items.

9
New cards

ceasar cipher

shift cipher

10
New cards

OTP- one time pad

encryption method in which the pre-shared key is used only once. Capturing or stealing key is useless since it will not be used again to encrypt.

11
New cards

Encryption

security technique that involves converting information or data into a code to prevent unauthorized access or understanding.

12
New cards

How does encryption work?

original data, (plaintext), is transformed into an unreadable format called cipher text using algorithms and encryption keys.

13
New cards

What is the primary purpose of encryption?

ensure teh confidentiality and privacy of information, protecting it from unauthorized disclosure or tampering. used in applications, like securing communication over the internet, protecting sensitive files and data on storage devices, ensuring privacy.

14
New cards

What is Full-Disk encryption?

provides comprehensive encryption by encrypting the entire storage device and securing all data stored on it.

15
New cards

What is partitioning?

offers selective protection by encrypting specific partitions on a storage device.

16
New cards

What is File encryption?

focuses on independently securing individual files, ensuring their confidentiality.

17
New cards

What is volume encryption

akin to partition encryption, but used in different contexts or technologies.

18
New cards

Database encryption

secures data within a database, shielding sensitive information from unauthorized access.

19
New cards

What is Record encryption?

narrows its focus to encrypting specific records or entries within a database.

20
New cards

What is transport or communication encryption?

plays crucial role in securing data during transmission, preventing unauthorized interception or access. Each layer contributes to overall tapestry of encryption.

21
New cards

What is asymmetric encryption

operates through a pair of keys, public and private, where data encrypted with one key can only be decrypted by its counterpart.

22
New cards

What is symmetric encryption?

employs a single key for both encryption and decryption.

23
New cards

What is Key Exchange.

critical element in encryption, involves the secure transmission of cryptographic keys between parties, enabling a foundation for secure communication.

24
New cards

Algorithims.

play a pivotal role in guiding the mathematical procedures for both encryption and decryption processes. Architects of the intricate dance that transforms plaintext into cipher text and then plaintext again.

25
New cards

The effectiveness of encryption is influenced by

key length, typically measured in bits. Longer keys makes for better security.

26
New cards

What is AES?

Advanced encryption Standard.

27
New cards

What is RSA?

Rivest-Shamir-Adleman

28
New cards

What is DES

Data Encryption Standard.

29
New cards

What is transposition?

When you order the letters into 6 columns.

30
New cards

What is a Vingenere Cipher

Po

31
New cards

What are the pros and cons of symmetric encryption?

Doesnt scale very well, challenging to distribute, but its very fast to use with less overhead than asymmetric encryption. It is often combined with asymmetric encryption.

32
New cards

Asymmetric encryption is also known as

public key cryptography

33
New cards

What is ECC

Elliptic curve cryptography. instead of using prime numbers, use curves.

34
New cards

How long are modern keys

128 bits or more. Some are combinations of different values to produce even larger numbers.

35
New cards

What is key stretching

used to convert a password to a longer and more random one.

36
New cards

What is hashing?

one way algorithm that converts data into a unique string of text known as a digest. Data cannot be recovered.

37
New cards

What is hashing used with

integrity checks, digital signatures, authentication, security apps, cryptocurrencies

38
New cards

What is a collision

when different inputs result in the same output hash. They are very rare and only found with early versions of hashing algorithms. such as MD5 and SHA-1

39
New cards

What is Salting?

to further increase the strength of passwords, salting is an addition of a random string of text to the password prior to hashing. The salt value is then stored with the has.

40
New cards

To verify a downloaded file,

websites provide the hash of the original file and if the provided hash matches the calculated then the file is unaltered. Digital signatures also provide proof a message has been unaltered.

41
New cards

What is a mode of Operation

algorithms used with a block cipher to make an encryption algorithm. Th

42
New cards

There are two forms of authenticated modes of operation

single sided which means one side validates like visiting a website with valid x.509 certificate. or mutual relies on a similar validation process but on both sides.

43
New cards

What is counter mode

CTR which changes block ciphers to stream ciphers by generating successive blocks using a non repeating counter.

44
New cards

What is a block chain?

A distributed and indisputable public ledger that stores records in a way allows distribution without tampering. Each record, called a block, is link via cryptography and contains a hash of teh previous blocks, timestamps, and transaction data. Repeated hashing makes it resistant to data alteration.

45
New cards

What is cryptograpghy?

“secret” “to hide” the practice and study of writing or solving codes.

46
New cards

Cryptoanalysis?

The art/study of solving and cracking encryptions without being told the key. Every time a new security tool is invented, attackers begin searching for weaknesses in the tool.

47
New cards

What are the uses of hashing in cryptography?

message integrity checks, digital signatures, authentication, information security applications, and cryptocurrencies.

48
New cards

Different secure hashing algorithms.

MD5, SHA256, SHA512

49
New cards

Story abt collisions

Xiaoyun Wang and Hong Yu in china demonstrated a collision in the MD5 proving collisions can exist in widely used hashing algorithms. It was determined that SHA-1 can have collisions. Since then it’s been broken. SHA2 and 3 and so on.

50
New cards

what is an x.509 certificate

the browser validates or invalidates the certificate and then you can navigate the site. Mutual authentication relies on these certificates both ways. irf

51
New cards

first digital cryptocurrency that was created to be used on the block chain.

bitcoin

52
New cards

Three components contained in a block when referring to the blockchain?

Data, hash, and hash of previous block

53
New cards

A hash is like a fingerprint

each one has its own unique qualities and characteristics

54
New cards

What is Public Key Infastructure

PKI- a framework that manages digital keys and certificates, ensuring secure communication and authentication in a networked environment.

55
New cards

What are teh three important components of PKI

public keys, private keys, escrow.

56
New cards

What is a public key?

a part of an asymmetric encryption system. The key is shared openly and used to encrypt data. It cannot decrypt. Only the corresponding private key can do that.

57
New cards

What is the private key?

The counterpart of the public key. It’s kept secret and used for decrypting data that was encrypted with a public key.

58
New cards

What is Key escrow.

when a trusted third party holds a copy of a user’s private key. It’s a precautionary measure in case the user loses access to their key. It can be released to law enforcement if necessary.

59
New cards

PKI is crucial for

secure communication, digital signatures, ensuring integrity and authenticity of data in online transactions, it provides framework for managing, distributing, and revoking digital certificates that authenticate identities of users and devices in a network.