Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
cryptography   the science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons ccant access it  
🗑
hashing   the process for creating a unique digital fingerprint signature for a set of data  
🗑
key   a mathematical value entered into the algorithim to produce ciphertext  
🗑
algorithim   procedures based on a mathematical formula,used to encrypt data  
🗑
block cipher   a cipher that manipulates an entire block of plain text at one time  
🗑
ciphertext   data that has been encrypted  
🗑
clear text   unencrypted data  
🗑
blowfish   a block cipher that operates on 64 bit blocks and can have a key length from 32 to 448 bits  
🗑
data encryption standard   a symmetric block cipher that uses a 56 bit key and encrypts data in 64 bit blocks  
🗑
advanced encryption standard   a symmetric cipher that was approved by the NIST in late 2000 as a replacement for des  
🗑
asymmetric cryptographic algorithim   encryption that uses two mathematically related keys  
🗑
decryption   the process of changing ciphertext into plaintext  
🗑
elliptic curve cryptography   an algorithim that does not use prime numbers to compute keys  
🗑
encryption   the process of using plaintext into ciphertext  
🗑
gnu privacy guard   free and open source software that is commonly used to encrypt and decrypt email messages  
🗑
gpg   gnu privacy guard  
🗑
hsm   hardware security module  
🗑
hsm   a secure cryptographic processor  
🗑
hash   the unique digital fingerprint created by a hashing algorithim  
🗑
md   message digest  
🗑
md   a common hash alggorithim of several different versions  
🗑
md5   a revision of md4 designed to address its weaknesses  
🗑
nonrepudiation   the process of performing that a user performed an action  
🗑
ntlm   new technology lan manager  
🗑
ntlm hash   password hash that is no longer recommended for use  
🗑
otp   one time pad  
🗑
otp   using a unique truly random key to create ciphertext  
🗑
plaintext   data input into an encryption algorithim  
🗑
pretty good privacy   pgp  
🗑
pgp   a commercial product that is commonly used to encrypt email messages  
🗑
private key   an asymmetric encryption key that does have to be protected  
🗑
pulic key   an asymmetric encryption key that does not have to be protected  
🗑
rc4   an rc stream cipher that will accept keys up to 128 bits in length  
🗑
rc   rivest cipher  
🗑
rc   a family of cipher algorithims designed by ron rivest  
🗑
rsa   an asymmetric algorithim published in 1977 and patented by mit in 1983  
🗑
sha   secure hash algorithim  
🗑
sha   creates hash values of longer lengths than message digest algorithims  
🗑
stream cipher   an alorithim that takes one algorithim and replaces it with another  
🗑
steganography   hiding the existence of data within text,audio,or video file  
🗑
ripemd   a hash algorithim  
🗑
ripemd   uses two different and independent parallel chains of computation and combines the result at the end  
🗑
ripemd   race integrity primitives evaluation message digest  
🗑
symmetric cryptographic algorithim   encryption that uses a single key to encrypt and decrypt a message  
🗑
3des   triple data encryption standard  
🗑
3des   a symmetric cipher that was designed to replace des  
🗑
tpm   trusted platform module  
🗑
tpm   a chip on the motherboard of the computer that provides cryptographic services  
🗑
twofish   a later derivation of the blowfish algorithim that is considered to be strong  
🗑
whole disk encryption   cryptography that can be applied to entire disks  
🗑
metadata   data that is used to describe the content or structure of the actual data  
🗑
stenography   hides the existence of data  
🗑
cryptography   transforms info into secure form  
🗑
cryptography   scramble info so it is unreadable  
🗑
encryption   changing the original message into a secret message using cryptography  
🗑
decryption   changing back into original form  
🗑
cleartext data   data in an unencrypted form  
🗑
confidentiality   only authorized parties can view it  
🗑
integrity   ensures info is correct and unaltered  
🗑
availability   authorized users can access it  
🗑
crytography has five basic functions   confidentiality  
🗑
crytography has five basic functions   integrity  
🗑
crytography has five basic functions   availability  
🗑
crytography has five basic functions   authenticity  
🗑
crytography has five basic functions   nonrepudiation  
🗑
hashing   primarily used for comparison purposes  
🗑
hash algorithims   basic type of cryptography  
🗑
hashing   used to determine the integrity of a message or contents of a file  
🗑
hashing can be used   to verify the integrity of data  
🗑
hashing   can not be reversed  
🗑
hashing   checking that you have what you are suppose to  
🗑
hash message authentication code   uses secret key provided by sender and receiver  
🗑
hmac   hash message authentication code  
🗑
md2   takes plaintext of any length and creates a hash 128 bits long  
🗑
md2   padding added to make short messages equal to 128 bits in length  
🗑
md4   used for computers that process 32 bits at a time;takes plaintext of any length and creates a hash 128 bits long,padded to 512 bits  
🗑
sha   patterned like md hashes but created a hash that is 160 bits in length  
🗑
the number following SHA   indicates the length in bits of the hash that is generated  
🗑
whirlpool   recent cryptographic hash that creates a hash of 512 bits  
🗑
cryptographic one way function   the password itself is the key  
🗑
salt   a salt consists of random bits, creating one of the inputs to a one-way function  
🗑
cryptographic algorithims   are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it  
🗑
symmetric cryptographic algorithims   uses a single private key to both encrypt and decrypt data. Any party that has the key can use it to encrypt and decrypt data. They are also referred to as block ciphers  
🗑
two categories of symmetric algorithms   stream cipher  
🗑
stream cipher   a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream)  
🗑
substitution ciphers   takes a character and replaces it with a character  
🗑
homoalphabetic substitution cipher   maps a single plaintext character to multiple ciphertext characters  
🗑
transposition cipher   rearranges letters without changing them  
🗑
stream cipher   each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the cyphertext stream  
🗑
one time pad   a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key  
🗑
transposition cipher   the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed.  
🗑
cipher   an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.  
🗑
block cipher   a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key.  
🗑
block cipher   important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data  
🗑
data encryption standard   a previously predominant algorithm for the encryption of electronic data.  
🗑
triple data encryption standard   applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.  
🗑
aes   the official encryption for the u.s. government  
🗑
aes   The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext.  
🗑
rivest cipher   generates a pseudorandom stream of bits (a "keystream") which, for encryption, is combined with the plaintext using XOR as with any Vernam cipher; decryption is performed in the same way  
🗑
IDEA   The algorithm was intended as a replacement for the Data Encryption Standard  
🗑
Blowfish   provides a good encryption rate in software and no effective cryptanalysis of it has been found to date  
🗑
IDEA   operates on 64-bit blocks using a 128-bit key, and consists of a series of eight identical transformations (a round, see the illustration) and an output transformation (the half-round).  
🗑
twofish   symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.  
🗑
asymmetric cryptographic algorithms   a pair of keys is used to encrypt and decrypt a message so that it arrives securely  
🗑
important principles regarding asymmetric cryptography principles   key pairs  
🗑
important principles regarding asymmetric cryptography principles   public key  
🗑
important principles regarding asymmetric cryptography principles   private key  
🗑
important principles regarding asymmetric cryptography principles   both directions  
🗑
the basis for a digital signature   rests on the ability of asymmetric keys to work in both directions  
🗑
rsa algorithm   most common asymmetric cryptography algorithm  
🗑
rsa   an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem.  
🗑
rsa   creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key.  
🗑
elliptic curve cryptography   an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.  
🗑
elliptic curve cryptography   is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.  
🗑
elliptic curve cryptography   generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers.  
🗑
quantum cryptography   describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.  
🗑
quantum cryptography   based on the usage of individual particles/waves of light (photon) and their intrinsic quantum properties to develop an unbreakable cryptosystem  
🗑
quantum cryptography   essentially because it is impossible to measure the quantum state of any system without disturbing that system.  
🗑
quantum cryptography   This is a random sequence of bits, sent using a certain type of scheme, which can see two different initial values represent one particular binary value (0 or 1).  
🗑
quantum cryptography   fiber optic cables with incredibly pure optic properties have successfully transmitted photon bits up to 60 kilometers.  
🗑
quantum cryptography   exploits the properties of microscopic objects  
🗑
NTRUEncrypt   public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice-based alternative to RSA and ECC and is based on the shortest vector problem in a lattice (i.e. is not known to be breakable using quantum computers). Operations  
🗑
lattice based cryptography   generic term for asymmetric cryptographic primitives based on lattices.  
🗑
file system   method used by operating systems to store,retreive and organize files  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cgeaski
Popular Computers sets