INTECH 3201 sir cenon 1st term exam 3rd year 2nd sem

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

it is an art of communication between two users via coded message

cryptography

2
New cards

it is a process of scrambling data into a code that can onlyb be decoded with a key

encryption

3
New cards

it is the original representation of the information

plain text

4
New cards

the encoded version of the information

ciphertext

5
New cards

a unique digital key that unlocks the code

encryption key

6
New cards

the process of urning cipher text into plaintext

DECRYPTION

7
New cards

earliest written evidence of encryption can be found to ancient ____ nearly _____ BC

egypt nearly 4000BC

8
New cards

it contained a script recording his deeds in life

tom of Khnumhotep 2

9
New cards

first recorded instances of encyption being used for military is around____ BC

500BC

10
New cards

Spartan encryption used in invention called___

scytale

11
New cards

it allowed secret message to sent and recieved

scytale

12
New cards

it has electromehcanical rotor mechanism that scrambles the 26 letters form the alphabet

world war 2 (ENIGMA)

13
New cards

when did the data encryption become popular?

earl 1970s

14
New cards

why did the data encryption become popular?

because of expensive comuters and need for information retention

15
New cards

who named after the RSA?

Ron Rivest
Adi Shamir
Leonard Adleman

16
New cards

it introduced the concpt of a publi-proivate key pair for encryption

RSA

17
New cards

give the principles of cryptography?

CIANK
Confidentiality
Integrity
Authentiction
Non-repudiation
Key management

18
New cards

to keep data safe so that information stays private and secure

confidentiality

19
New cards

it means ensuring taht our data in transit or after recieving is intact or not

Integrity

20
New cards

the ability to make sure that data or information has not been changed or modified with

Integrity

21
New cards

it is the process of validating the identity of a user or device

Authentiction

22
New cards

a method of stopping a person from denying that he or she has committed a particular act or crime

Non-repudiation

23
New cards

it is the process of creating, distributing, and managing cryptographic keys

Key managemnet

24
New cards

give the 2 main types fo cryptographic systems

Symmetric
Asymmertic

25
New cards

it uses a single key for both encryption and decryption.

Symmetric encryption

26
New cards

give an examples of symmetric encryption

DES, 3DES, AES

27
New cards

DES means?

Data ENcryption Standard

28
New cards

it is a 56 bit key encryption method, now consider as weak

DES

29
New cards

it is an improved version of DES that apply encryption 3 times

3DES

30
New cards

AES stands for?

Advanced Encryption standard

31
New cards

it is awidely used and highly secure algorithm with key sizes of 128, 192, 256 bits

AES

32
New cards

advatages of symmetric encryption

-Fast and efficient for large amount of data
-less computational power

33
New cards

disadvantages of symmetric encryption

security

34
New cards

it is also known as public-key cyptography

asymmetric encryption

35
New cards

2 keys of asymmetric encrytption

-Public key (used for encryption)
-private key (Used for decryption)

36
New cards

_____ shared opnely, while the ____ key is kept secret

Public key_private key

37
New cards

examples of asymmetric encryption

RSA

ECC - Eliptic curve cyrptography

38
New cards

a woiely used encryption algorithm often used for securing online transactions and emails

RSA

39
New cards

a more effiecinet alternative to RSA used in mobile and IOT

ECC - Elliptic Curve Cryptography

40
New cards

giv the 2 types of cipher

stream cipher and the block cipher

41
New cards

it is an encryption technique that works byte by byte to transform plain text into code thats unreadable to anyone wihout the proper key

Strem Cipher

42
New cards

it takes a block of plaintext bits and generate a block of ciphertext bits, generally of same size

Block cipher

43
New cards

t or f
DES is a stream cipher

false
it is a block cipher

44
New cards

original size of DES

64 bits

45
New cards

t or f

ES was never cryptographically broken, but its key length is too short by nowadays standards and it could be brute forced with some effort.

true

46
New cards

the DES orgin date was?

1972

47
New cards

DES year dveloped was in ?

1971

48
New cards

_____ is based on the Feistel block cipher called _____

DES
Lucifer

49
New cards

DES is developed by IBM researcher:

Horst Feistel

50
New cards

DES was approved on _____ and got dominance came to an end in ____

November 1976
2002

51
New cards

it takes 64 bit plain text and turns into 64 bit cyphertext

DES Algorithm Steps

52
New cards

it is based the original data encryption standard (DES)

3DES

53
New cards

it is a symmetric block cipher chosen by the US government to protect classified information

AES
Advanced Encryption Standards

54
New cards

AES also known as …

Rijndael [reindal]

55
New cards

AES develoed by two belgian cryptographers namely…

Joan Daemen
Vincent Rijmen

56
New cards

_____ is a family of cipherss with different key and block sizes

Rijndael

57
New cards

it is based on a design prionciple known as a substitution-permutation netwrok, and it efficient in both software and hardware

AES

58
New cards

t or f
AES also use Feistel network

false- AES does not used Feistel network

59
New cards

it operates on 4×4 column-major order array of 16 bytes

AES

60
New cards

round keys are derived from the cipher key using the EAS key scheule. AES requires a separate 128 bit round key block for each round plus one more

Key Expansion

61
New cards

it is a non linear substitution steps where each byte is replaced with another according to lookup table

SubBytes

62
New cards

a transposition step where the last three rows of the state are shifted cyclically a certain number of steps

ShiftRows

63
New cards

a linear mixing operations which operates on the columns of the state, sombining the four bytes in each column

MixColumn

64
New cards

each byte of the state is combined with a byte of the round subkey using the XOR operation

AddRoundKey

65
New cards

it is one of the oldest widely used for secure data transmission

RSA

66
New cards

t or f

there is no published methods to defeat the system if a large enough key is used

True

67
New cards

t or f

RSA is relatively fast algorithm

false-
RSA is a relatively slow algorithm

68
New cards

the idea of an asymmetric public-private key cryptosystem is attributed to _____ and ______, who piblished the concept in 1976

Whitfield Diffie
Martin Hellman

69
New cards

4 steps of RSA Algorithm

key generation
key distribution
encryption
decryption

70
New cards

Rivest and shamir is ____, while Adleman is ____

Rivest and shamir is computer scientist , while Adleman is mathematician