Explore tens of thousands of sets crafted by our community.
Symmetric Key Cryptography
30
Flashcards
0/30
Encryption
The process of converting plaintext into an unreadable format, called ciphertext, using a cipher and a secret key.
Plaintext
Readable text or data that is fed into the encryption algorithm to produce ciphertext.
Advanced Encryption Standard (AES)
A symmetric key encryption algorithm adopted as an encryption standard by the U.S. government. It is fast, secure, and widely used.
Pseudorandom Number Generator (PRNG)
An algorithm that uses mathematical formulas to produce sequences of numbers that simulate randomness.
Stream Cipher
A type of encryption algorithm that encrypts plaintext one byte or bit at a time, typically using a key stream generator.
Key Distribution
The process of sharing the secret key among communicating parties while preventing unauthorized parties from accessing it.
Exclusive Or (XOR)
A logical operation that outputs true or '1' only when inputs differ (one is true, the other is false). Commonly used in cryptographic functions for combining two bitstreams.
Symmetric-Key Cryptography
A cryptography method that uses the same secret key for both the encryption of the plaintext and the decryption of the ciphertext.
Side-channel Attack
An attack that exploits the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms.
Cipher Block Chaining (CBC)
An encryption mode that combines each block of plaintext with the previous ciphertext block before being encrypted.
Triple DES (3DES)
An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
Meet-in-the-middle Attack
An attack that attempts to defeat a cryptographic scheme by exploiting the nature of a mathematical operation it uses, often by finding a collision in the algorithm.
Kerckhoffs's Principle
A principle stating that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Confidentiality
The property that information is not disclosed to unauthorized individuals, entities, or processes.
Ciphertext
The unreadable output of an encryption algorithm. The result of encrypting plaintext using a cipher and a key.
Known-plaintext Attack
An attack model in which the attacker has access to both the plaintext and its corresponding ciphertext and is trying to use this to reveal further secret information, such as secret keys.
Cipher
An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Electronic Codebook (ECB)
A block cipher mode that encrypts each block of plaintext independently using the same key, which can lead to patterns in ciphertext for identical blocks of plaintext.
Cryptanalysis
The study of analyzing information systems to understand the hidden aspects of the systems. It is used to breach cryptographic security systems and gain access to the contents of encrypted messages.
Initialization Vector (IV)
An arbitrary number that can be used along with a secret key for data encryption. It adds randomness to the encryption process and makes pattern attacks more difficult.
Block Cipher
A type of encryption algorithm that operates on fixed-size blocks of data, using the same, unchanging key, to transform plaintext into ciphertext
Counter (CTR)
A block cipher mode that converts a block cipher into a stream cipher, generating the next keystream block by encrypting successive values of a counter.
Random Number Generator (RNG)
A function or algorithm that generates a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance.
Decryption
The process of converting ciphertext back to plaintext using a cipher and the appropriate secret key.
Hash Function
A function that converts a variable-length string of characters into a fixed-length value. While not strictly encryption, it's often grouped with cryptographic functions.
Key Size
The number of bits in the key used in a cryptographic algorithm. Increasing key size generally increases security.
Brute Force Attack
An attack method that involves trying all possible key combinations until the correct key is found.
Substitution Cipher
A cipher that replaces elements of the plaintext with ciphertext according to a fixed system.
Data Encryption Standard (DES)
An outdated symmetric key encryption standard that uses a 56-bit key, now considered insecure due to its short key length.
Permutation Cipher
A cipher that rearranges the characters in the plaintext according to a fixed rule.
© Hypatia.Tech. 2024 All rights reserved.