lecture 5 Flashcards
(49 cards)
What is Cryptography?
Cryptography is scrambling information so it cannot be read and transforms information into a secure form so unauthorised persons cannot access it
What is Steganography?
Steganography hides the existence of data by embedding hidden messages in images audio or video files
How is data hidden using Steganography?
Data is divided and hidden in unused portions of the file or in file header fields between metadata sections
What is Encryption?
Encryption is changing original text into a secret message using cryptography
What is Decryption?
Decryption is changing the secret message back to its original form
What is Plaintext?
Plaintext is unencrypted data to be encrypted or the output of decryption
What is Ciphertext?
Ciphertext is the scrambled and unreadable output of encryption
What is Cleartext?
Cleartext data is data stored or transmitted without encryption
What does a Cryptographic Algorithm do?
A cryptographic algorithm uses mathematical formulas to encrypt and decrypt data
What is a Key in cryptography?
A key is a mathematical value entered into the algorithm to produce ciphertext and is used in reverse to decrypt
What is a Substitution Cipher?
A substitution cipher replaces one character with another
What is ROT13?
ROT13 is a substitution cipher where the alphabet is rotated 13 steps such that A becomes N
What is an XOR cipher?
An XOR cipher uses the binary operation eXclusive OR to compare bits returning 1 if bits differ and 0 if identical
What protections can Cryptography provide?
Confidentiality integrity authentication nonrepudiation and obfuscation
What is Confidentiality in cryptography?
Confidentiality ensures only authorised parties can view the information
What is Integrity in cryptography?
Integrity ensures that information is correct and unaltered
What is Authentication in cryptography?
Authentication verifies the sender through cryptography
What is Nonrepudiation?
Nonrepudiation proves that a user performed an action and cannot deny it
What is Obfuscation?
Obfuscation is making something obscure or unclear often used as security through obscurity
What are the three states of data Cryptography protects?
Data in processing data in transit and data at rest
What is a limitation of Cryptography related to low-power devices?
Low-power devices require protection but have limited resources restricting strong cryptography use
What is the Resource vs Security Constraint?
It is the balance between available resources like time and energy and the security level provided by cryptography
What are the three categories of Cryptographic Algorithms?
Hash algorithms symmetric cryptographic algorithms and asymmetric cryptographic algorithms