Cryptography Overview

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts in cryptography, including definitions, encryption types, and important algorithms.

Last updated 9:15 PM on 12/17/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

22 Terms

1
New cards

Cryptography

The science of protecting information by transforming it into a form that is unreadable to unauthorized users.

2
New cards

Plaintext

The original message before encryption.

3
New cards

Ciphertext

The coded message resulting from the encryption process.

4
New cards

Encryption

The process of converting plaintext into ciphertext.

5
New cards

Decryption

The process of restoring the plaintext from the ciphertext.

6
New cards

Symmetric Encryption

A type of encryption where the same key is used for both encryption and decryption.

7
New cards

Asymmetric Encryption

A type of encryption that uses different keys for encryption (public key) and decryption (private key).

8
New cards

Hash Function

A function that converts input data into a fixed-length string (hash value), ensuring integrity.

9
New cards

Digital Signature

An encrypted hash value that verifies the integrity and authenticity of a message using a user's private key.

10
New cards

Caesar Cipher

A substitution cipher that shifts letters of the alphabet by a fixed number.

11
New cards

Cryptanalysis

Techniques used for deciphering a message without knowledge of the enciphering details.

12
New cards

Stream Cipher

A cipher that encrypts data one bit or byte at a time.

13
New cards

Block Cipher

A cipher that encrypts data in fixed-size blocks (commonly 64 or 128 bits).

14
New cards

Key

A piece of information that determines the output of a cryptographic algorithm.

15
New cards

Encryption/Decryption Algorithms

Procedures used to encrypt or decrypt messages, such as AES and RSA.

16
New cards

Integrity

The assurance that information is accurate and unaltered.

17
New cards

Confidentiality

The principle of keeping information secret from unauthorized access.

18
New cards

Authentication

The process of verifying the identity of a person or system.

19
New cards

Non-repudiation

A service that ensures a party cannot deny the authenticity of their signature on a document or a message.

20
New cards

Cipher

A method or algorithm for encrypting and decrypting messages.

21
New cards

Substitution

Encryption technique where each letter in the plaintext is replaced by a different letter or symbol.

22
New cards

Permutation

Encryption technique where the order of elements in the plaintext is rearranged.