Chapter 5 Flashcards

1
Q

The process of transforming readable data (plaintext/cleartext) into an unreadable form (ciphertext)

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Readable Data

A

Plaintext/Cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unreadable Data

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The science of protecting the confidentiality and integrity of data

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of recovering the plaintext message from the ciphertext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A password that you can apply to the algorithm to retrieve a message

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Testing every possible key to retrieve the original message

A

Brute Forcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An unbreakable cipher when used properly

A

One-Time Pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses the same mechanism as the Caesar Cipher, but moves each letter 13 places forwards and is a more recent cipher.

A

ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message but a certain number of letters, historically three

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses a single key for both encryption of the plaintext and decryption of the ciphertext

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext

A

Cryptography Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The science of breaking through the encryption used to create ciphertext. Finding the weakness in the given algorithm.

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ corroborates (gives support to) the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An algorithm used for cryptographic purposes

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An encryption cipher that uses the same key to encrypt and decrypt

A

Symmetric Key Cryptography

17
Q

How many disks did the Jefferson Disk contain?

18
Q

Was used to secure German communication during WWII

19
Q

Who created the enigma?

A

Arthur Scherbius

20
Q

aka Private Key Cryptography

A

Symmetric Key Crytography

21
Q

aka Public Key Cryptography

A

Asymmetric Key Cryptography

22
Q

Uses a two keys. A public Key to encrypt data and a Private Key to decrypt data.

A

Asymmetric Key Cryptography

23
Q

SSL

A

Secure Sockets Layer

24
Q

The rules that define communication between devices

25
ECC
Elliptic Curve Cryptography
26
Uses short keys while maintaining a higher cryptography strength than many other types of algorithms
Elliptic Curve Cryptography
27
Converts the plaintext into a largely unique and fixed-length value.
Hash Functions
28
Allows you to sign a message so that others can detect any changes to the message after you've sent it
Digital Signature
29
Links a public key to an individual by validating that the key belongs to the proper owner. Often used as a form of electronic identification for that person.
Digital Certificate
30
Takes a predetermined number of bits in the plaintext message and encrypts that block.
Block Cipher
31
Encrypts each bit in the plaintext message one bit at a time
Stream Cipher
32
Used to encrypt all our network traffic
Virtual Private Network
33
Two main VPN methods used
Internet Protocol Security (IPsec) VPN Secure Sockets Layer (SSL) VPN
34
Requires a more complex hardware configuration on the back end and a software client to be installed
Internet Protocol Security (IPsec) VPN
35
Operated from a lightweight plug-in downloaded from a webpage and a less complex hardware configuration on the back end.
Secure Sockets Layer (SSL) VPN
36
AES
-
37
RSA
-