Principles of Information Security Chapter 8

Study Guide t o Princi

62 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Cryptology
Is the science of encryption; combines cryptography and cryptanalysis. It has a long and multicultural history.
Cryptography
Is the process of making and using codes to secure transmission of information. It is used to secure most aspects of Internet and Web uses that require it, drawing on extensive set of protocols and tools designed for that purpose.
Cryptanalysis
Is the process of obtaining orginal message from encrypted message without knowing algorithms.
Encryption
Is converting orginial message into a form unreadable by unauthorized individuals. With emergence of technology the need for this in information technology environment is greatly increased. All popular Web browsers use this built-in feature for secure e-commerce applications.
Decryption
Is the process of converting the ciphertext message back into plaintext.
Plaintext
This can be encrypted through bit stream or block cipher method.
Bit Stream
Is when each plaintext bit is transformed into a cipher bit one bit at a time.
Block Cipher
Is when the message is divided into blocks (e.g., sets of 8 or 16 bit blocks) and each is transformed into encrypted "Blank" of "Blank" bits using algorithm and key.
Substituion Cipher
Will substitue one value for another.
Monoalphabetic substitution
This uses only one alphabet.
Polyalphabetc substitution
This is more advanced and uses two or more alphabets.
Vigenere Cipher
Is an advanced cipher type that uses simple polyalphabetic code; made up of 26 distinct cipher alphabets.
Transposition Cipher or Permutation Cipher
This is easy to understand, but if properly used, produces eiphertext that is difficult to decipher. It rearragnes values within a block to create ciphertext. It can be done at the bit level or at the byte level. To make the encryption even stronger, the keys and block sizes can be made much larger.
Exclusive OR (XOR)
Is a funtion of Boolean algebra; two bits are compared. (e.g., if two bits are identical, result is binary 0: if two bits are not identical, result is binary 1) It is a very simple symmetric cipher that is used in many applications where security is not a defined requirement.
Vernam Cipher
This uses a set of characters once per encryption process. This was developed by AT&T.