• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Decryption Algorithms

Input C Cipher textInput K the decrypticn Keyperform decryption stepsoutputthe plaintext

SY metric Algorithms

Encryption and decryption operation use the Same key


Asymetric Algorithms

Use different keys known as public keysPaired keys


c I A

Ccnfi dentiality ensures that unauthorize individuals are not able to gain access to sensitive informationIntegrity protects messages against Unauthorized modification Authentication manySystems that Verify the identity of users rely upon the use of encryption Non Repudiation means That reciepent OF a message Can prove to an ihdepedent third party that the message actually came from the alleged sender AKA digital signatures

Codes and cipher

are two different things


CODE

A system thut substitutes one word or phrase for another . Codes are intended to provide secrecy and or efficiency


Police 10 code talk, or spy using phrases that are talking in code

Choosing encryption algorithms

Encrytion uses mothers. tcl techniques and Algorithms Do not try to build Your own algorithmIF a vendor does not want to disclose Share the detail red flag Use algorithm with proven background to be securedlonger the hey the more secure


The perfect encryption algorithm

Onetime pad1882Sender And reciever have identical neys

DES

Data Encryption standardSYmmtr:c algorithMdesigned cnd Implemented by IBM in the 1970's for unclassified Communication through cut the federal governmentNO lcnge r Considered Secured

3 DES

triple DESthree rounds of DESwarns on' 64 bit blockconsider secured today

AES

Allows for three different key lengths 128 bit 192 or 256 bituey . All 3 are Considered secured

Blowfish

symmetric Algorithm works on blocks OF 64 bits using any Key length you Choose between 32 and 448 hitsno longer Considered secured