Cryptography Course Presentation by Dr. Adel A. El-Zoghabi

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key vocabulary and concepts from Dr. Adel A. El-Zoghabi's lecture on cryptography.

Last updated 11:29 PM on 3/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Cryptography

The basic foundation for all security topics in computer networks; its main purpose is to achieve message privacy.

2
New cards

Hashing

A subfield in cryptography aimed at achieving message integrity, message authentication, message non-repudiation, and people authentication.

3
New cards

PGP (Pretty Good Privacy)

Provides application layer security to secure eMail messages.

4
New cards

SSL/TLS

Available at the transport layer to secure TCP segments.

5
New cards

IPSec

Available at the network layer to secure IP datagrams, typically used in VPNs.

6
New cards

Firewall

A security system designed to protect a site from intruders or malicious software.

7
New cards

C.I.A. Triad

A model for information security consisting of three main principles: Confidentiality, Integrity, and Availability.

8
New cards

Passive Attack

An attack that seeks to merely observe or analyze the data being transmitted without interfering.

9
New cards

Active Attack

An attack that involves the modification, insertion, or deletion of data in transit.

10
New cards

Symmetric-Key Cryptography

Encryption where the same key is used by both the sender and receiver.

11
New cards

Asymmetric-Key Cryptography

Uses a pair of keys: a public key for encryption and a private key for decryption.

12
New cards

Plaintext

The original, unencrypted message.

13
New cards

Ciphertext

The coded (encrypted) message.

14
New cards

Cipher

The algorithm used for transforming plaintext into ciphertext.

15
New cards

Encipher (Encrypt)

The process of converting plaintext into ciphertext.

16
New cards

Decipher (Decrypt)

The process of recovering plaintext from ciphertext.

17
New cards

Cryptanalysis

The study of methods for deciphering ciphertext without knowing the key.

18
New cards

WiFi Security

Security measures for wireless networks, including standards such as WEP, WPA, WPA2, and WPA3.

Explore top notes

Explore top flashcards

flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)
flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)