Cryptography Flashcards
(236 cards)
A developer wants to send a system administrator a message and wants to use a cipher that reorders the plaintext characters to create the ciphertext. Which cipher meets this requirement?
Transposition cipher is a method of encryption in which the location of the characters in the plaintext is rearranged throughout the ciphertext while the characters themselves are left unchanged.
A developer wants to encrypt a data stream using a symmetric key and wants to encrypt the data in such a way that the cipher method encrypts the individual bits. Which cipher method can the developer use to meet this requirement?
Stream cipher is an encryption algorithm that breaks a plaintext message down into single bits and encrypts 1 bit of plaintext at a time.
the science of keeping information secret and safe by transforming it into a form that unintended recipients cannot understand using an algorithm (a series of mathematical operations)
cryptography
the art of breaking or “cracking” the protection provided through cryptography algorithms
cryptanalysis
the study and practice of both cryptography and cryptanalysis
cryptology
a human-readable unencrypted message used as an input to a cipher (encryption algorithm) before encryption or after decryption
plaintext
unreadable encrypted message output after an encryption algorithm has been used on the plaintext
ciphertext
the process (or algorithm) used to encrypt and decrypt a message
cipher
what could you use to encrypt individual files?
Aescrypt
What would you use to encrypt full disks?
Bitlocker
where a single mapping from our alphabet to a cipher alphabet is created. Many early
cryptosystems used this
Mono-alphabetic
refers to the mapping of our alphabet to a number of cipher alphabets. This approach
added a bit of complexity to early cryptosystems
Polyalphabetic
considered to be unbreakable since it only uses its cipher code once
One-time pad
repeats the random numbers after a given time (periodic). They are
fast and are also deterministic and are useful in producing a repeatable set of random numbers
Pseudo-Random Number Generators (PRNGs)
This method generates a true random number and uses some form of random
process. One approach is to monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Overall, the method is generally slow, especially if it involves human interaction, but is non-deterministic and aperiodic
True Random Number Generators
s cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three
letters correlate the letters THE in the English alphabet.
Frequency Analysis
measures the amount of unpredictability; in encryption relates to the degree of uncertainty of the encryption process.
Entropy
Two common binary to characters encoding methods are
ASCII and UTF-16
encoding method (8-bit values, up to 256 characters)
ASCII
Encoding method:16- bit values, up to 65,536 characters
UTF-16
which is more efficient? hardware or software encryption?
Hardware encryption is more efficient than software encryption.
tamper-evident and an intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing
hardware security module (HSM)
a dedicated processor that handles hardware-level encryption. allows the use of full-disk encryption on a hard drive in a manner that minimizes the impact on system performance. contains encryption keys.
trusted platform module (TPM)
Simply divide the first number by the second and return the remainder. Annotated using the (mod) or (%). Example:
5 mod 2 = 1 [2 goes into 5 a max of twice (4), 5-4 = the remainder which is 1]
Modulus Operator Math