Chapter 1 Flashcards
Fundamentals/Early Crypto Systems (17 cards)
What is encryption?
changing plaintext to ciphertext
What is decryption?
changing ciphertext back into plaintext
Encryption should be applied to information you want to protect _______ and ________.
at rest/in transit
Aescrypt is used to encrypt __________.
individual files
Bitlocker or FileVault are used to encrypt ____________.
full disks
Monoalphabetic
is where a single mapping from our alphabet to a cipher alphabet is created. Many early cryptosystems used this.
Polyalphabetic
refers to the mapping of our alphabet to a number of cipher alphabets. This approach added a bit more complexity to early cryptosystems.
One-Time Pad
considered to be unbreakable since it only uses its cipher once.
Pseudo-Random Number Generators (PRNGs)
This method repeats the random numbers after a given time (periodic). They are fast and also deterministic and are useful in producing a repeatable set of random numbers.
True Random Number Generators (TRNGs)
This method generates a true random number and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or form the pauses between keystrokes. Overall, this method is generally slow, especially if it involves human interaction. but it is non-deterministic and aperiodic.
Frequency Analysis
is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes (i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet).
Entropy
measures level of unpredictability; in encryption relates to the degree of uncertainty of the encryption process.
ASCII
Common binary to characters encoding method. 8-bit values, up to 256 characters.
UTF-16
Common binary to characters encoding method. 16-bit values, up to 65,536 characters.
Hardware versus Software encryption
Hardware encryption is more efficient than software encryption.
Hardware Security Module (HSM)
is a tamper-evident and intrusive-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.