Encryption/Decryption Flashcards
(42 cards)
Encryption
Taking a message and disguising it, where the sender and the receiver are the only ones who can decipher it.
Decryption
A message being converted from encrypted to the normal message.
Cipher
A disguised message
Plain Alphabet
The regular alphabet
Plain message
Original message with no encryption
Cipher Alphabet (Shifted Alphabet)
The alphabet that replaces the normal alphabet in the plain message to create the Cipher message.
Cipher message
The plain message that is encrypted with the Cipher Alphabet.
Key
A piece of information the sender and receiver share, to do the algorithm, to figure out the plain message.
Substitution Cipher
Substitution the normal alphabet with cipher alphabet with a different letter.
Ex. R -> Q, A->C, F->P
Caesar Cipher
Type of Cipher alphabet where the plain Alphabet is shifted down a certain number of units to create a Cipher Alphabet.
Random Substitution Cipher
Cipher alphabet with no pattern(randomly mixed, no shift)
Frequency Analysis
Analyzing the frequency of letters in a cipher message
Key exchange problem
A problem that occurs when two people send two keys and a message that gets intercepted.
Symmetric encryption
Encryption that uses the SAME KEY to encrypt and decrypt the message.
Public Key Encryption (asymmetric)
When the sender and receiver BOTH HAVE A PRIVATE KEY and PUBLIC KEY, both helping the decrypt and encrypt the message. If the sender uses the reciever’s public key to encrypt the message, the recipient’s private key is needed to decrpyt the message.
Public Key
A key that is sent to the receiver, but is available to the public and can be viewed by everyone.
Private Key
A key kept to yourself.
RSA encryption
Encryption similar to public key exchange, but both the public and private key (only 2 keys) can encrypt the message, but the opposite is needed to decrypt it. If B encrypts the message using A’s public key, than A’s private key is needed to decrypt it.
Unreasonable problem
A problem that’s unreasonable and isn’t necessary.
AES encryption
A symmetric block cipher used by the US government to protect classified information, using 128, 192, and 256 bit keys to create the cipher and cipher text.
Protocol
A set of instructions or rules someone/something follows to complete a certain task(similar to an algorithm).
Digital Certificate
Certificates/ confirms the AUTHORITY AND IDENTITY of a website, individual, organization, user, device or server. Also validates the OWNERSHIP OF ENCRYPTION KEYS.
Certificate Authority (CA)
They issue digital certificates that validate ownership of encryption keys used in secure communications. They are based on a trust model.
SSL (secure sockets layer)
The protocol used for digital certificates.