Chapter 13 Flashcards

1
Q

cryptography

A

The practice and study of hiding information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cipher

A

An algorithm that can perform encryption or decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

algorithms

A

Well-defi ned instructions that describe computations from their initial
state to their fi nal state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asymmetric key algorithm

A

A type of cipher that uses a pair of different keys to encrypt
and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

symmetric key algorithm

A
A class of cipher that uses identical or closely related keys for
encryption and decryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stream cipher

A

A type of algorithm that encrypts each byte in a message one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

block cipher

A

A type of algorithm that encrypts a number of bits as individual units
known as blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

public key cryptography

A

Uses asymmetric keys alone or in addition to symmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

steganography

A
The science (and art) of writing hidden messages; it is a form of security
through obscurity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Encryption Standard (DES)

A

An older type of block cipher selected by the United
States federal government back in the 1970s as its encryption standard; due to its weak
key, it is now considered deprecated.
data loss prevention (DLP) Systems that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Triple DES (3DES)

A

Similar to DES but applies the cipher algorithm three times to each
cipher block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Encryption Standard (AES)

A

An encryption standard used with WPA and
WPA2.

The successor to DES/3DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RSA

A

A public key cryptography algorithm created by Rivest, Shamir, Adleman. It is
commonly used in e-commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Diffie-Hellman key exchange

A

Invented in the 1970s, it was the fi rst practical method
for establishing a shared secret key over an unprotected communications channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

elliptic curve cryptography (ECC)

A

A type of public key cryptography based on the
structure of an elliptic curve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

one-time pad

A

A cipher that encrypts plaintext with a secret random key that is the
same length as the plaintext.

17
Q

Pretty Good Privacy (PGP)

A

An encryption program used primarily for signing,
encrypting, and decrypting e-mails in an attempt to increase the security of e-mail
communications.

18
Q

hash

A

A summary of a fi le or message. It is generated to verify the integrity of the fi le
or message.

19
Q

hash function

A

A mathematical procedure that converts a variable-sized amount of data
into a smaller block of data.