Lesson 3: Explain Cryptographic Solutions Flashcards
Define ‘Cryptography’
The science and practice of encoding or decoding data to make it unintelligible to unauthorized parties.
Define ‘security through obscurity’
Keeping something a secret by hiding it.
Define ‘Plaintext/Cleartext’
Unencrypted data.
Define ‘Ciphertext’
Encrypted data that can’t be read without the cipher key.
Define an ‘Algorithm’
Process that encrypts and decrypts data.
Define ‘Cryptanalysis’
The science/practice of breaking ciphers and cryptographic systems.
Define an ‘Encryption’ algorithm/cipher
Process that encodes data so that it can be stored or transmitted securely and then decrypted only by its owner or its intended recipient.
Define a ‘key’ in cryptography
Specific piece of data that is used in an algorithm to perform encryption and decryption.
What are the two types of encryption algorithms?
- Symmetric
- Asymmetric
Define a ‘substitution’ cipher/algorithm
Replacing characters or blocks in the plaintext with different text or ciphertext.
Define a ‘Transposition’ cihper/algorithm
The units of data stay the same, but their order is changed depending on the mechanism.
Define ‘Symmetric Encryption’
Shared-key encryption; Two-way encryption process in which encryption and decryption are both performed by the same key.
What is the benefit of symmetric encryption?
Used for bulk encryption of large amounts of data due to its speed; Very fast
What is the security risk in symmetric encryption?
The transmission/receipt of the shared-key; Security is broken if the key is intercepted along with the cipher text.
Define ‘key length’
Size of a cryptographic key in bits; Longer keys generally offer better security and are harder to crack with brute force.
What is the downside to using larger encryption keys?
The computer must use more resoruces to perform encryption and decryption.
Define ‘Asymmetric Encryption’
One-way encryption; Cipher that uses public and private keys mathematically linked by RSA or ECC algorithms;
What is the difference between asymmetric encryption and symmetric encryption?
An asymmetric key cannot reverse the operation it performs; The public key cannot decrypt what it has encrypted and vise versa.
What is the function of the public key in asymmetric encryption?
Key is freely distributed and can be used to perform reverse encryption or decryption operation of the linked private key in the pair.
What is the function of the private key in asymmetric encryption?
Uniquely associated with the owner and is not made public; Used to encrypt data that can be decrypted by the linked public key or vice versa.
What is a downfall of asymmetric encryption?
Involves substantial computing overhead compared to symmetric encryption and is inefficient for large amounts of data.
How can the overhead from asymmetric encryption be mitigated with large amounts of data?
Asymmetric encryption can be used to encrypt a symmetric key that was used to encrypt data before transmitting the data.
Define ‘cryptographic hashing’ algorithms
One-way encryption that produces a fixed-length string of bits from a plaintext input.
What does a hashing algorithm produce?
The output is a ‘hash’ or ‘message digest’