5.3 Flashcards
(31 cards)
A __________ is an unauthorized listener(spy).
eavesdropper
An _______ in the context of encyption, the mathematical formula used to scramble and unscramble data.
algorithm
A ______ is a value that is used to encrypt or decrypt a message.
value
T or F: A key can include numeric and alphanumeric text and special symbols.
true
A ________ is restoring the original plain text from the cipher text.
decryption
_________ is the process of converting plain text to cipher text.
encyption
_______ is the process of coding information into a form that is unreadable.
encryption
________ is an algorithm for transforming plain text to cipher text.
cipher
________ is the coded message (or) a non-readable form of the original text.
cipher text
_______ is the original message (or) an original readable textual material message or data.
plain text
___________ is the study of methods used to transmit information securely between two or more participants, so that it is unreadable by unauthorized users.
cryptography
T or F: Cryptography is an essential tool to achieve the basic goals of Information Security.
true
_________ is the science of breaking cipher texts without the knowledge of the key.
cryptanalysis
cryptography and cryptanalysis are known as _________.
cryptology
Encryption and decryption, Hash functions, Digital Signatures, and Digital Certificates (digital IDs) are some of the popular _____________.
cryptographic mechanisms
T or F: The conversion and subsequent recovery of the data depend on a code or a key, which can be a number or a string of characters.
true
Encryption is a cryptographic mechanism that helps to achieve the security service __________, whether the information is in storage or in transit.
confidentiality
T or F: The fundemental requirement of Encryption is that no information is lost (all operation are reversible).
true
What are two basic techniques for encryption?
substitution ciphers, and transposition ciphers.
In ________ ciphers, each element in the plain text (bit, letter, group of bits or letters) is mapped into another element.
subsitution
In ________ ciphers, elements in the plain text are rearranged or plain text characters are shifted in some regular pattern to form cipher text.
transposition
the security of the data is totally dependent on two things: the strength of the _________ and the secrecy of the ______.
cryptographic algorithms, key.
What are the two types of cryptograhic algorithms?
Asymmetric cryptography, and Symmetric cryptography.
In __________ algothrithms, we use the same key to encrypt and decrypt the data.
Symmetric