#33 Flashcards
(39 cards)
What uses many layers of varying security mechanisms to frustrate attackers?
Defense in depth
One of the most common forms of computer security?
Cryptography
The word cryptography comes from roots ‘crypto’ and ‘graphy’ roughly translating to what?
Secret writing
In order to make information a secret you use what?
Cipher
What is an algorithm that converts plain text into cipher text, which is gibberish unless you have a key that lets you undo the cipher?
Cipher
The process of making text secret
encryption
the reverse process of encryption
decryption
Encryption and decryption are the same thing you just have to make sure the _________ and ________ machines have the same initial configuration.
sending and receiving
Julius Caesar used what is now called a _______ _______, to encrypt private correspondence. He would shift the letters in a message forward by three places. To decipher the message, recipients had to know both the ________ and the _______ to shift by, which acted as the key.
Caesar Cipher
algorithm and number
The Caesar Cipher is one example of a larger class of techniques called substitution ciphers. These replace every letter in a message with something else according to a translation.
True
A skilled cryptanalyst can work backwards from these kinds of statistics to figure out the message.
Cryptanalyst
Here we take a message and fill the letters into a grid. To encrypt the message you read out the characters in a different order. Example from the bottom left working upwards one column at a time. This is known as what?
Columnar transposition Cipher
New letter ordering is the encrypted message. This is what?
Permutation
The ordering direction, as well as the 5 by 5 grid size serves as the what?
Key
What was used by the nazis to encrypt their wartime communications?
German Enigma
What was a typewriter like machine, with a keyboard and lapboard, both showing the full alphabet. Above that there was a series of configurable rotors that were the key to the Enigma’s encryption capability.
Enigma
What device has one side with electrical contacts for all 26 letters. These connected to the other side of the rotor using cross-crossing wires that swapped one letter for another.
Enigma Rotor
Letter swapping behavior is a what?
Substitution Cipher
Following the rotors was a special circuit called? Instead of passing the signal onto another rotor, it connected every pin to another and sent the electrical signal back through the rotors.
Reflector
There is a _________ at the front of the machine that allows letters coming form the keyboard to be optionally swapped, adding another level of complexity.
plugboard
To prevent the ______ from being a simple;e substitution cipher, every single time a letter was entered the rotors advanced by one spot, sort of like an odometer in a car.
Enigma
One of the earliest software ciphers to become widespread was the ________ _______ ______ developed by IBM and NSA in 1977.
Data Encryption Standard
DES as it was known originally used ______ keys that were 56 bits long, which means that there are 2 to the 56 or about 72 quadrillion different keys.
Binary
in 2001 the ________ _______ _______ was finalized and published. AES if designed to use much bigger keys 128,192,256 bits in size making brute force attacks much harder.
Advanced Encryption Standard