Chapter 2 Cyrptography Flashcards
(104 cards)
What is cryptography?
Cryptography is the science of hiding data for confidentiality.
What is obfuscation?
Obfuscation is the act of hiding information to make it unclear or difficult to understand.
What is diffusion in cryptography?
Diffusion is the process of spreading data to make it less visible or obvious.
What is confusion in cryptography?
Confusion is the process of creating chaos or disorder to make data unrecognizable.
What is encryption?
Encryption is the process of transforming data into a secret code.
What is decryption?
Decryption is the process of converting encrypted data back into its original form.
What is the Caesar cipher?
The Caesar cipher is a substitution cipher technique that shifts letters by a fixed number of positions.
What is the Vigenere cipher?
The Vigenere cipher is a cipher that combines Caesar ciphers with additional confusion.
What are algorithms in cryptography?
Algorithms are mathematical procedures used to perform encryption and decryption.
What are keys in cryptography?
Keys are secret codes or passwords used to encrypt and decrypt data.
What is Exclusive OR (XOR)?
Exclusive OR (XOR) is a binary operation used in encryption algorithms.
What is Kerckhoff’s Principle?
Kerckhoff’s Principle states that security should depend on the secrecy of the key, not the algorithm.
What are open standards in cryptography?
Open standards are encryption methods that are publicly available and widely scrutinized for security.
What is data at rest?
Data at rest refers to data that is stored on a hard drive or mass storage and is not actively being accessed or manipulated.
What is data in use?
Data in use refers to data that is actively being accessed, processed, or manipulated by software programs in RAM (Random Access Memory).
What is data in transit?
Data in transit refers to data that is being transmitted or moved across networks, such as wired or wireless networks.
What is sniffing in the context of data in transit?
Sniffing is the act of intercepting and capturing data that is being transmitted over networks, with the intent of capturing sensitive information.
What is man-in-the-middle attack?
A man-in-the-middle attack is an attack where an attacker intercepts and relays communications between two parties without their knowledge, often capturing or altering the transmitted data.
Why are wireless networks more vulnerable to sniffing?
Wireless networks are more vulnerable to sniffing because the data is transmitted through the airwaves, making it easier for attackers to intercept and capture the data.
What are some risks associated with data in use?
Risks associated with data in use include unauthorized access to sensitive information, shoulder surfing, keyloggers, and other forms of data interception or theft while the data is being actively processed.
Why is data encryption important for data at rest and in transit?
Data encryption is important for data at rest and in transit to ensure the confidentiality and security of the data, making it difficult for unauthorized individuals to access or decipher the information.
What is the difference between data at rest and data in transit?
Data at rest refers to stored data on a hard drive, while data in transit refers to data that is actively being transmitted or moved across networks.
Why is it important to understand the different types of data for cryptography?
Understanding the different types of data helps in applying appropriate cryptographic measures to protect data at rest, in use, and in transit, based on the specific vulnerabilities and risks associated with each type.
What is symmetric encryption?
Symmetric encryption is a type of encryption where the same key is used for both encrypting and decrypting the data.