(Answered) 100% Correct. Updated Fall
2024/2025.
encryption
converts information from plaintext into ciphertext
-protects sensitive information from unauthorized disclosure
cryptography
the use of mathematical algorithms to transform information into an encrypted form that is not readable
by unauthorized individuals
decryption
converts ciphertext messages back to plaintext form
Input: P, the plaintext message
Input: K, the encryption key
perform encryption with the P and K
Output: C, the encrypted ciphertext
Encryption algorithm
Input: C, the ciphertext
Input: K, the decryption key
perform decryption steps using C and K
Output: P, the plaintext message
decryption algorithm
symmetric encryption
also known as shared secret encryption algorithms
encryption and decryption use the same shared secret key
asymmetric encryption
also known as public key cryptography
encryption and decryption use different keys from the same pair
asymmetric cryptography
anything encrypted with one key from a pair can be decrypted with the other key from that same pair
-uses key pairs
-non repudiation
, public key
freely distributed to communications partners
private key
kept secret, used to decrypt
confidentiality, integrity, authentication, obfuscation, non-repudiation
5 goals of cryptography
confidentiality
1st goal of cryptography
-no unauthorized access
integrity
2nd goal of cryptography
-no unauthorized changes
authentication
3rd goal of cryptography
-proof of identity claims
obfuscation
4th goal of cryptography
-hiding sensitive data and source code
-unintelligible
non repudiation
5th goal of cryptography
-verification of origin
-only possible with asymmetric cryptography
data at rest
data stored on a hard drive or other storage
data in transit
data transmitted over a network connection
data in use
data processed actively in memory
code
a system that substitute one word or phrase for another