Cryptography & Encryption

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Twofish encryption

block cipher that encrypts data in 128-bit blocks

Triple DES (3DES) encryption

block cipher that uses DES encryption, but the strength of the algorithm uses two or three keys

private key

decrypts data once they are received

Cryptanalyst

discovers weaknesses and vulnerabilities in solutions

substitution cipher

each letter represents a different letter

Ciphertext

encoded message

Cryptogram

encoded message as a whole

block cipher

encrypts chunks or blocks of data in fixed size at one time

stream cipher

encrypts each bit of data at one time

public key

encrypts the data and can be located anywhere; not a secret

hybrid encryption

form of encryption that merges symmetric and asymmetric encryption

Blowfish encryption

free symmetric encryption designed to replace DES cipher

watermark

image or text included in a file often used to prove ownership

microdot

image shrunk to roughly the size of a period

Encryption

is derived from the Greek work kryptos, meaning hidden or secret

pre shared key

key used in symmetric encryption

polyalphabetic substitution cipher

mixes a number of cipher alphabets in the cryptogram so each plain letter text is continuously changed

transposition cipher

one in which the words are rearranged within the text

quantum cryptology

physics is used in place of mathematics

Steganography

practice of hiding a file, text, image, or even a video inside another file

Cryptanalysis

process used to discover vulnerabilities in ciphers

RC4 (Rivest cipher 4) encryption

stream cipher characterized by a variable-sized cipher and a random algorithm based on permutation

cryptology

study of ciphers and ciphertext

Advanced Encryption Standard (AES)

symmetric encryption that requires 128-, 192-, and 256-bit keys

Data Encryption Standard (DES)

symmetric encryption that requires keys to be 56 bits in length

Alan Turing

the father of computer science and broke the German Enigma Code Machine

Cipher

tool used to change normal or plain text into something that is unreadable and then back into readable text

key pair

use of both public and private keys in this transaction

symmetric encryption

uses a single key to encrypt and decrypt data

asymmetric encryption

uses two keys, a public key and a private key, to encrypt and decrypt data

mutual authentication

when both peers agree that the other is who they claim to be

IP Security (IPSEC)

Uses cryptographic functions to provide data integrity and confidentiality for IP traffic


Ensembles d'études connexes

NSG252 - EAQ Sherpath - Lewis Acid Base

View Set

MDA- Ch. 11 Overview of Dentition Test Q&A

View Set

Patho Check Your Understanding 1,2,4,7

View Set

Stress and its Effects on Health

View Set

Priority Setting Framework Beginner

View Set