Week 6 Flashcards

1
Q

replaces bits, characters or blocks or characters with different bits characters or blocks

jpresuello

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

does not replace text but rather moves the original values around

jpresuello

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encryption method that uses Caesars method but shifts the letter 13 spaces

jpresuello

A

ROT 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of cipher used in Enigma Machine

jpresuello

A

polyalphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

random bits that will be used by the algorithm to specify how the plain text is converted

jpresuello

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mathematical formulas that dictate the rules how plaintext will be turned to cipher text

jpresuello

A

Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

work on blocks of bits

jpresuello

A

Block CIpher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

work on bits one byte at a time

jpresuello

A

Stream Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first block cipher Introduced mathematical equations and functions introduced by IBM

jpresuello

A

Lucifer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

science of studying and breaking the secrecy of encryption processes

jpresuello

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

method of transforming readable data, called plaintext into a form that appears to be random and unreadable, which is called cipher text

jpresuello

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any system or product that provides encryption and decryption service

jpresuello

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hybrid system of symmetric and asymmetric key algorithms

jpresuello

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trusted organization that maintains and issues digital certificates.

jpresuello

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a method of storing and transmitting data in a form that only those it is intended for can read and process.

jpresuello

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 Block Cipher Modes

jpresuello

A

Electronic Codebook, Cipher Block Chaining, Cipher Feedback, Output Feedback, Counter

17
Q

_____ carried out through substitution

jpresuello

A

Confusion

18
Q

_ carried out through transposition

jpresuello

A

Diffusion

19
Q

Does cryptosystem use keys?

jpresuello

A

Yes

20
Q

Symmetric Encryption provides?

jpresuello

A

confidentiality

21
Q

Asymmetric encryption provides?

jpresuello

A

authentication and confidentiality

22
Q

True of False? Media files are ideal for steganography because of large file size?

jpresuello

A

True

23
Q

DES stands for

jpresuello

A

Data Encryption Standard

24
Q

How many bits is AES

jpresuello

A

128

25
Q

True or False: Diffie-Hellman is vulnerable to man in the middle attack?

jpresuello

A

True

26
Q

Why is Diffie-Hellman vulnerable to man in the middle attack?

jpresuello

A

No AUTHENTICATION prior to sending public keys

27
Q
A