1/17
This set of flashcards covers key vocabulary and concepts from Dr. Adel A. El-Zoghabi's lecture on cryptography.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cryptography
The basic foundation for all security topics in computer networks; its main purpose is to achieve message privacy.
Hashing
A subfield in cryptography aimed at achieving message integrity, message authentication, message non-repudiation, and people authentication.
PGP (Pretty Good Privacy)
Provides application layer security to secure eMail messages.
SSL/TLS
Available at the transport layer to secure TCP segments.
IPSec
Available at the network layer to secure IP datagrams, typically used in VPNs.
Firewall
A security system designed to protect a site from intruders or malicious software.
C.I.A. Triad
A model for information security consisting of three main principles: Confidentiality, Integrity, and Availability.
Passive Attack
An attack that seeks to merely observe or analyze the data being transmitted without interfering.
Active Attack
An attack that involves the modification, insertion, or deletion of data in transit.
Symmetric-Key Cryptography
Encryption where the same key is used by both the sender and receiver.
Asymmetric-Key Cryptography
Uses a pair of keys: a public key for encryption and a private key for decryption.
Plaintext
The original, unencrypted message.
Ciphertext
The coded (encrypted) message.
Cipher
The algorithm used for transforming plaintext into ciphertext.
Encipher (Encrypt)
The process of converting plaintext into ciphertext.
Decipher (Decrypt)
The process of recovering plaintext from ciphertext.
Cryptanalysis
The study of methods for deciphering ciphertext without knowing the key.
WiFi Security
Security measures for wireless networks, including standards such as WEP, WPA, WPA2, and WPA3.