CRYPTOGRAPHY Flashcards

(14 cards)

1
Q

What is privacy ?

A

It is to prevent unauthorized persons from extracting information transferred through the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication ?

A

It is to prevent unauthorized persons from injecting an unwanted
information into the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cryptography ?

A

It is the transformation of a plain message into an unintelligible one
message (ciphertext).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key ?

A

It is a set of symbols or characters that determines a specific encryption transformation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is cryptanalysis ?

A

It is an estimation of the plaintext by analyzing the ciphertext in the
channel, without benefit of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cipher brake ?

A

It is a disclosure of the ciphering algorithm using the cipher-text-
only attack (brute-force) or the known plaintext attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of cryptography?

A

Private key and public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is plaintext?

A

Readable data before encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ciphertext?

A

Encrypted data after encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What key pair does asymmetric cryptography use?

A

Public key + private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plaintext refers to:

A. The encrypted message
B. The decrypted key
C. The readable original message
D. The hashing output

A

✅ Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ciphertext is:

A. A compressed bitstream
B. Output of source coding
C. A modulated signal
D. Encrypted data

A

✅ Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric cryptography uses:

A. Two identical keys
B. One key only
C. A public and a private key
D. Three independent keys

A

✅ Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A main goal of cryptography listed in the document is:

A. Noise reduction
B. Packet multiplexing
C. Confidentiality
D. Bandwidth optimization

A

✅ Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly