• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Caesar Cipher

A number of shifts in the alphabet taken place to create a code.

Random Substitution

When the letters in the alphabet are substituted randomly to create a secret code.

Vigenere Cipher

a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.

One-time Pad

also called Vernam-cipher or the perfect cipher, is a crypto algorithm where plaintext is combined with a random key. It is the only existing mathematically unbreakable encryption.

Public Key Encryption

s any cryptographic system that uses two kinds of keys: public keys that may be disseminated widely, while private keys are known only to the owner. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver's private key.

Computationally Hard Problem

Hananiah

Heuristic

enabling a person to discover or learn something for themselves.

Algorithm

a procedure or formula for solving a problem.

Brute Force

a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.

Symmetric Encryption

the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way.

Asymmetric Encryption

is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely.

One-way Function

is a mathematical function that is significantly easier to compute in one direction (the forward direction) than in the opposite direction (the inverse direction)

Modular Arithmetic

a system of arithmetic for integers, where numbers "wrap around" upon reaching a certain value—the modulus (plural module).