Chapter 1 Flashcards

Fundamentals/Early Crypto Systems (17 cards)

1
Q

What is encryption?

A

changing plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is decryption?

A

changing ciphertext back into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption should be applied to information you want to protect _______ and ________.

A

at rest/in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Aescrypt is used to encrypt __________.

A

individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bitlocker or FileVault are used to encrypt ____________.

A

full disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Monoalphabetic

A

is where a single mapping from our alphabet to a cipher alphabet is created. Many early cryptosystems used this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Polyalphabetic

A

refers to the mapping of our alphabet to a number of cipher alphabets. This approach added a bit more complexity to early cryptosystems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One-Time Pad

A

considered to be unbreakable since it only uses its cipher once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pseudo-Random Number Generators (PRNGs)

A

This method repeats the random numbers after a given time (periodic). They are fast and also deterministic and are useful in producing a repeatable set of random numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True Random Number Generators (TRNGs)

A

This method generates a true random number and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or form the pauses between keystrokes. Overall, this method is generally slow, especially if it involves human interaction. but it is non-deterministic and aperiodic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Frequency Analysis

A

is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes (i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Entropy

A

measures level of unpredictability; in encryption relates to the degree of uncertainty of the encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASCII

A

Common binary to characters encoding method. 8-bit values, up to 256 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UTF-16

A

Common binary to characters encoding method. 16-bit values, up to 65,536 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware versus Software encryption

A

Hardware encryption is more efficient than software encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Security Module (HSM)

A

is a tamper-evident and intrusive-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.