Chapter 1 (1-5): Introduction to MLSA Flashcards
(34 cards)
the science of encryption
Cryptography
the science of breaking encryption
Cryptanalysis
combination of cryptography and cryptanalysis.
Cryptology
has been used in human communication for millennia as a way to preserve confidential information.
Cryptography
[7] Some Example of Cryptography
- Egyptian Nonstandard Hieroglyphs
- Spartans Scytale
- Caesar Cipher
- Vigenere Table
- Zimmerman Telegram
- Code Talker
- Enigma Machine
is a type of cryptography where every letter is replaced by a non-standard character.
Egyptian Nonstandard Hieroglyphs
is one of the simplest and most widely known encryptions. Each letter in the plaintext is replaces by a letter some fixed number of positions down the alphabet.
Caesar Cipher
a substitution type cypher that uses a table and a keywork in generating ciphertext.
Vigenere Table
was a secret diplomatic communication issued from the Germany Foreign Office.
Zimmerman Telegram
was a person employed by the military to use a little-known language as a mean o secret communication.
Code Talker
is a cipher device developed and user by Nazi Germany during World War II.
Enigma Machine
a mathematical algorithm that takes plain text and changes it into ciphertext for security purposes.
Modern Cryptography
is any cryptographic algorithm that is based on a shared key that is used to encrypt and decrypt.
Symmetric Cryptosystem
- The same method is used for encrypting and decrypting.
Symmetric Cryptosystem
this method uses two different methods in cryptographic process.
Asymmetric Cryptosystem
each plaintext digit is encrypted one at a time with corresponding digit of the keystream, to give a digit of the ciphertext stream.
Stream Cipher
The encryption is done character by character in a form of a stream.
Stream Cipher
is a deterministic algorithm operating on fixed-length groups of bits called blocks.
Block Cipher
The plaintext is divided into several block. Encryption is done block by block.
Block Cipher
is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of cryptographic algorithm.
Key Exchange Protocol
[2] Cryptography Goals
- Encryption
- Authentication
prevent other from intercepting message.
Encryption
prevent someone from impersonating the receiver of the message.
Authentication
[4] Cryptographic Attacks
- Ciphertext Only
- Known Plaintext
- Chosen Plaintext
- Distinguishing Attack