3.3: Cryptography Flashcards

1
Q

Encryption

A

The process of transforming plaintext into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

plaintext

A

Encryption is the act of hiding information in plain sight. read by anyone who has access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ciphertext

A

A message, file, or stream of data that has been transformed by an encryption algorithm and rendered unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hash function

A

A cryptographic operation on a block of data that returns a fixed-length string of characters, used to verify the integrity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Message Digest

A

The output of a cryptographic function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital signature

A

The result of encrypting the hash of a message with the originator’s private encryption key, used to prove the authenticity and integrity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Algorithm

A

A specific mathematical formula that is used to perform encryption, decryption, message digests, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

The process of transforming ciphertext into plaintext so that a recipient can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalysis

A

An attack on a cryptosystem where the attacker is attempting to determine the encryption key that is used to encrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption key

A

A block of characters, used in combination with an encryption algorithm, used to encrypt or decrypt a stream or blocks of data. An encryption key is also used to create and verify a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key encrypting key

A

An encryption key that is used to encrypt another encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block cipher

A

An encryption algorithm that operates on blocks of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stream cipher

A

A type of encryption algorithm that operates on a continuous stream of data such as a video or audio feed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Initialization vector (IV)

A

A random number that is needed by some encryption algorithms to begin the encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Symmetric encryption

A

Symmetric encryption refers to those methods where the same key is used to encrypt and decrypt the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Asymmetric encryption , or public key cryptography A .

A

A method for encryption, decryption, and digital signatures that uses pairs of encryption keys, consisting of a public key and a private key .

17
Q

• Key exchange

A

A technique that is used by two parties to establish a symmetric encryption key when there is no secure channel available.

18
Q

• Nonrepudiation

A

The property of digital signatures and encryption that can make it difficult or impossible for a party to later deny having sent a digitally signed message, unless they admit to having lost control of their private encryption key.