Save
Cryptography
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Carrie Rose
Visit profile
Cards (37)
Brute Force Attack
Systematically guessing potential keys until
the
correct key
is
found
Cryptanalysis
The science of
breaking cryptography
Authentication
The process of
verifying
the
identity
of a
user
Data Breach
Leak
of
sensitive data
to a third
party
or unauthorised deletion of personal information
Cybersecurity
The
protection
of
information systems
,
data
, and
online services
from
unauthorised access
,
harm
or
misuse
Availability
The
security objective
of ensuring
timely
and uninterrupted access to and use of information
Confidentiality
The
security
objective to preserve
authorised restrictions
on information
access
and
disclosure
Non-repudiation
Sender is provided proof of delivery and recipients proof of sender's identity - nether can deny their communication
Substitution encryption
is a
bijective
function
Each
ciphertext
letter has only one
plaintext
corresponding letter
Key
Space
of a Cipher
All possible
combinations
of keys
GSM Technology
Achieves
confidentiality through
a
stream
-cipher
Letter Frequency
The
number
of times letters of the
alphabet
appear on average in
written
language
Polyalphabetic
Cipher (Vigenère Cipher)
Works by using a
repeating keystream
Stream Ciphers
Perform encryption
bit-by-bit
and are used for streaming applications such as
voice
or
video
transmission
Block
Ciphers
Operates on
blocks
or
chunks
of text and the
plaintext
is divided into
blocks
or
chunks
of
text
too
A5/1 Stream
Cipher
This is one of the encryption algorithms used in cybersecurity for GSM. It uses the
modulo-2 arithmetic.
The
modulo-2 addition operator
Is essentially the
XOR
operator
True Random Number Generators
(TRNG)
Randomness
from a
real random phenomenon
Pseudo Random Number Generators
(PRNG)
Are computed, seem random but are
deterministic
Cryptographically Secure Random
Number
Generators
(
C-RNG
)
PRNG
with one
additional
property - the
numbers
are
unpredictable
One-Time Pad
(
OTP
)
The
OTP
is a stream cipher where the
key stream bits
stem from
TRGN
and each
key stream bit
is only used
once
OTP Advantage
Knowing the
ciphertext
doesn't give you any
additional insight
into the value on the
plaintext
OTP Disadvantage
Keys need
to be as
long
as the
message
and because
keys
cannot be reused that's a lot of
bits
over
time
Kerckhoff's Principle
A
cryptosystem
should be
secure
even if the
attacker
knows all
details
about the
system
except the
secret key
Cryptography
The
science
of creating
secret messages
Cryptanalysis
The science of
breaking cryptographic systems
and
deciphering secret messages
Encryption
Hiding
a
message
by using a
coder
or
cipher
Decryption
Revealing an
encrypted
message
Plaintext
The
original
message before
encryption
Ciphertext
The
encrypted
message
Data Integrity
Information
and programs are only
changed
specifically
System Integrity
System performs
operation
in an
unimpaired
way
Authenticity
Being
genuine
and being able to be
verified
and
trusted
Accountability
Will be able to be
traced
back to a
specific
person
Methods of
Confidentiality
Information classification
,
access controls
,
encryption
,
governance
Integrity
Guarding against
improper information
modification
or
destruction
Identification
The process of
verifying
the
claimed identity
of a user attempting to access a
computer system