Cryptography is from ___ and ___
Kryptos which means hidden
graphein which means to write
Literally cryptography translates to ___
hidden writing
The use of cryptography can be traced to the ancient ____ and their use of ___
Egyptians, hieroglyphs
cryptography is used rto create various types of encryption protocols
SImplest cryptographic type
Symmetric key cryptography
sometimes known as “public key” system
asymmetric cryptography
Only the intended recipient can access and read the information, so
conversations and data remain private.
Confidentiality
Cryptography ensures that the encoded data cannot be modified or
tampered with enroute from the sender to the receiver without leaving traceable
marks— an example of this is digital signatures.
Integrity
identities and destinations (or origins) are verified.
Authentication
Senders become accountable for their messages since they
cannot later deny that the message was transmitted
Non-repudiation
early pioneer in the field of cryptography
IBM
IBM released ___ encryption in the 1960s which became the first ___
Lucifer, Data Encryption Standard
This simpler form of cryptography takes its name from the fact that both the sender and receiver share one key to encrypt and decrypt information.
Symmetric Key Cryptography
Some examples of this are the Data Encryption Standard (DES) and
Advanced Encryption Standard (AES).
Symmetric Key Cryptography
A more secure type of cryptography, this involves
both the sender and receiver having two keys: one public and one private.
Asymmetric Key Cryptography
The ___ algorithm is the most popular form of asymmetric
cryptography.
Rivest-Shamir-Adleman
These are types of cryptographic algorithms that do not involve the
use of keys. Instead, a hash value is created based on the length of the plain text information and used
to encrypt the data.
Hash Functions
a number of fixed lengths that acts as a unique
data identifier
hash
Symmetric encryption is sometimes called ____ because one single secret key is used to encrypt and decrypt information.
secret key cryptography
These work on a single byte of data at a time and regularly change
the encryption key.
Stream ciphers
These work on a single byte of data at a time and regularly change
the encryption key.
Block ciphers
sometimes referred to as public-key encryption
Asymmetric cryptography
___ encrypts and decrypts messages using algorithms.
Asymmetric key cryptography
The first type of asymmetric cryptography to be created, RSA is the basis of
digital signatures and key exchanges, among other things.
Rivest-Shamir-Adleman