Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Symmetric Key Cryptography

30

Flashcards

0/30

Still learning
StarStarStarStar

Encryption

StarStarStarStar

The process of converting plaintext into an unreadable format, called ciphertext, using a cipher and a secret key.

StarStarStarStar

Plaintext

StarStarStarStar

Readable text or data that is fed into the encryption algorithm to produce ciphertext.

StarStarStarStar

Advanced Encryption Standard (AES)

StarStarStarStar

A symmetric key encryption algorithm adopted as an encryption standard by the U.S. government. It is fast, secure, and widely used.

StarStarStarStar

Pseudorandom Number Generator (PRNG)

StarStarStarStar

An algorithm that uses mathematical formulas to produce sequences of numbers that simulate randomness.

StarStarStarStar

Stream Cipher

StarStarStarStar

A type of encryption algorithm that encrypts plaintext one byte or bit at a time, typically using a key stream generator.

StarStarStarStar

Key Distribution

StarStarStarStar

The process of sharing the secret key among communicating parties while preventing unauthorized parties from accessing it.

StarStarStarStar

Exclusive Or (XOR)

StarStarStarStar

A logical operation that outputs true or '1' only when inputs differ (one is true, the other is false). Commonly used in cryptographic functions for combining two bitstreams.

StarStarStarStar

Symmetric-Key Cryptography

StarStarStarStar

A cryptography method that uses the same secret key for both the encryption of the plaintext and the decryption of the ciphertext.

StarStarStarStar

Side-channel Attack

StarStarStarStar

An attack that exploits the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms.

StarStarStarStar

Cipher Block Chaining (CBC)

StarStarStarStar

An encryption mode that combines each block of plaintext with the previous ciphertext block before being encrypted.

StarStarStarStar

Triple DES (3DES)

StarStarStarStar

An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.

StarStarStarStar

Meet-in-the-middle Attack

StarStarStarStar

An attack that attempts to defeat a cryptographic scheme by exploiting the nature of a mathematical operation it uses, often by finding a collision in the algorithm.

StarStarStarStar

Kerckhoffs's Principle

StarStarStarStar

A principle stating that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.

StarStarStarStar

Confidentiality

StarStarStarStar

The property that information is not disclosed to unauthorized individuals, entities, or processes.

StarStarStarStar

Ciphertext

StarStarStarStar

The unreadable output of an encryption algorithm. The result of encrypting plaintext using a cipher and a key.

StarStarStarStar

Known-plaintext Attack

StarStarStarStar

An attack model in which the attacker has access to both the plaintext and its corresponding ciphertext and is trying to use this to reveal further secret information, such as secret keys.

StarStarStarStar

Cipher

StarStarStarStar

An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

StarStarStarStar

Electronic Codebook (ECB)

StarStarStarStar

A block cipher mode that encrypts each block of plaintext independently using the same key, which can lead to patterns in ciphertext for identical blocks of plaintext.

StarStarStarStar

Cryptanalysis

StarStarStarStar

The study of analyzing information systems to understand the hidden aspects of the systems. It is used to breach cryptographic security systems and gain access to the contents of encrypted messages.

StarStarStarStar

Initialization Vector (IV)

StarStarStarStar

An arbitrary number that can be used along with a secret key for data encryption. It adds randomness to the encryption process and makes pattern attacks more difficult.

StarStarStarStar

Block Cipher

StarStarStarStar

A type of encryption algorithm that operates on fixed-size blocks of data, using the same, unchanging key, to transform plaintext into ciphertext

StarStarStarStar

Counter (CTR)

StarStarStarStar

A block cipher mode that converts a block cipher into a stream cipher, generating the next keystream block by encrypting successive values of a counter.

StarStarStarStar

Random Number Generator (RNG)

StarStarStarStar

A function or algorithm that generates a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance.

StarStarStarStar

Decryption

StarStarStarStar

The process of converting ciphertext back to plaintext using a cipher and the appropriate secret key.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts a variable-length string of characters into a fixed-length value. While not strictly encryption, it's often grouped with cryptographic functions.

StarStarStarStar

Key Size

StarStarStarStar

The number of bits in the key used in a cryptographic algorithm. Increasing key size generally increases security.

StarStarStarStar

Brute Force Attack

StarStarStarStar

An attack method that involves trying all possible key combinations until the correct key is found.

StarStarStarStar

Substitution Cipher

StarStarStarStar

A cipher that replaces elements of the plaintext with ciphertext according to a fixed system.

StarStarStarStar

Data Encryption Standard (DES)

StarStarStarStar

An outdated symmetric key encryption standard that uses a 56-bit key, now considered insecure due to its short key length.

StarStarStarStar

Permutation Cipher

StarStarStarStar

A cipher that rearranges the characters in the plaintext according to a fixed rule.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.