Module 03 - Criptography Flashcards
(103 cards)
Definition:
Cryptography
The process of writing or solving messages using a secret code
Definition:
Security through obscurity
Protecting by hiding something
Definition:
Encryption
A form of cryptography, it’s a process of converting text into unintelligible text, or a ciphertext.
Definition:
Ciphertext
Encrypted text
What’s Cryptanalysis?
The art of cracking cryptographic systems
What are Encryption Keys?
String used to encrypt and decrypt messages, generated by ciphers
What kinds of encryption keys are there?
Symmetric and Assymetric
Definition:
Symmetrick algorithm
The same key that encrypts also decrypts
Definition:
Asymmetric algorithm
Uses a public key to encrypt and a private key to decrypt
Definition:
Hashing
The process of converting one value into another, no decrypting, no duplicates
Definition:
Salt [Hashing]
It’s the process of fixating a string at the end of a value before hashing it, to generate a completely different hash
What’s a Digital Signature?
Verifies that data is legitimate, non-repudiation.
Private key + Hash of data
What’s non-repudiation?
The concept of not being able to disassociate the ‘cause’ from the ‘consequence’.
Audit trails
Acronym:
ECC
Elliptic Curve Cryptography
Definition:
Elliptic Curve Cryptography - ECC
Cryptography method that generates more complex and smaller encryption keys
Definition:
Perfect Forward Secrecy
Most used in messaging apps, uses a different encryption key for each message in the same conversation
Definition:
Steganography
Technique of hiding files, messages, bytes in other files, messages or bytes
Definition:
Cipher or Encryption Algorithm
Cryptographic process that encodes and decrypts data, using encryption keys
What are the types of ciphers?
- Substitution and Transposition algorithm
- Symmetric Algorithm
- Asymmetric Algorithm
Acronym:
AES
Advanced Encryption Standard
True or false:
The larger the key’s length the more memory and processing power to encrypt/decrypt
True
Definition:
Brute force cryptoanalysis
Attempt to decrypt a ciphertext with every possible key
True or false:
Symmetric algorithm is more processing consuming that Asymmetric
False