Encryption Flashcards

(15 cards)

1
Q

What is encryption?

A

The process of converting plaintext into ciphertext, which cannot be understood without the key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is plaintext?

A

Data in human-readable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ciphertext?

A

Data that has been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric encryption?

A

Encryption that uses the same key to encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric encryption?

A

Encryption that uses different keys to encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Caesar Cipher?

A

A substitution cipher where one character of plaintext is substituted for another, which becomes ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the limitations of Caesar Cipher?

A

Caesar Cipher is computationally insecure. This is because letter frequency analysis can be used to determine the shift and there are only 25 possible different shifts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do all encryption techniques suffer from?

A

The key exchange problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the key exchange problem?

A

We need to send the key to the recipient without anyone intercepting it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a solution for the key exchange problem?

A

The one time pad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the one time pad?

A

A key that is only used once to encrypt and decrypt a message, then it is discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Vernam Cipher?

A

It is a cipher that uses a one time pad. It’s more secure than Caesar Cipher and involves XOR operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Vernam Cipher work?

A

A key is created of entirely random characters that are the same length as the message.

For each character in the message and the key, traditionally the 5-bit Baudot Code is used to convert the character into binary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is computational hardness?

A

The degree of difficulty in cracking a code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the conditions for perfect security in Vernam?

A
  • The key must be truly random
  • The key length must be at least the same as the plaintext length
  • The key must only be used once then discarded (one time pad)
  • The key must only be shared with the intended recipient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly