1. Changing plaintext into ciphertext
(Should be applied in at rest and in transit): Encryption
2. Changing ciphertext to plaintext: Decryption
3. Encrypt individual files and full disks with options such as
BitLocker and
FileVault: Aescrypt
4. Mapping from our alphabet to a number of cipher
alphabets. Added complexity in early cryptosystems.:
Polyalphabetic
5. Single mapping from our alphabet to a cipher alphabet is
created. Many early cryptosystems.: Mono-Alphabetic
6. Considered un-breakable since it only uses its cipher code
once.: One-Time
Pad
7. Method repeats the random numbers after a given time.
(periodic) They are fast and deterministic.
Useful in producing repeatable set of random numbers.:
Pseudo-Random Num- ber Generators (PRNGs)
,8. Method generates a true random number and uses some
form of random process. One approach is to monitor the
movements of a mouse pointer on a screen or from the
pauses between keystrokes. Overall, the method is gener-
ally slow, especially if it involves human interaction, but is
non-deterministic and aperiodic.: True Random Number
Generators (TRNGs)
9. Cipher cracking methodology that involves identifying
patterns and varia- tions in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the
beginning of a string too often could tip us off that those
three letters correlate the letters THE in the English
alphabet.: Frequency Analysis
10. measures level of unpredictability: Entropy
11. Two common binary to characters encoding methods:
ASCII (8bit value, up to 256 characters)
UTF-16 (16bit values, up to 65,536 characters)
, 12. 8 bit value, up to 256 characters: ASCII
13. 16 bit value, up to 65,536 characters: UTF-16
14. Tamper-evident and intrusion-resistant physical device
that safeguards and manages cryptographic keys and
provides cryptographic processing.: - Hardware Security
Module (HSM)
15. Which encryption is more efficient?: Hardware
16. Dedicated processor that handles hardware-level
encryption; allows the use of full disk encryption on a hard
drive in a manner that minimizes the impact on system
performance.
Contains the encryption keys.: Trusted platform module (TPM)
17. value which only has factors of 1 and itself: Prime Number
18. Determine the likelihood of an event happening, typically
by understanding the chances of how each of the elements
involved in an event interact, and the likelihood of them
(Should be applied in at rest and in transit): Encryption
2. Changing ciphertext to plaintext: Decryption
3. Encrypt individual files and full disks with options such as
BitLocker and
FileVault: Aescrypt
4. Mapping from our alphabet to a number of cipher
alphabets. Added complexity in early cryptosystems.:
Polyalphabetic
5. Single mapping from our alphabet to a cipher alphabet is
created. Many early cryptosystems.: Mono-Alphabetic
6. Considered un-breakable since it only uses its cipher code
once.: One-Time
Pad
7. Method repeats the random numbers after a given time.
(periodic) They are fast and deterministic.
Useful in producing repeatable set of random numbers.:
Pseudo-Random Num- ber Generators (PRNGs)
,8. Method generates a true random number and uses some
form of random process. One approach is to monitor the
movements of a mouse pointer on a screen or from the
pauses between keystrokes. Overall, the method is gener-
ally slow, especially if it involves human interaction, but is
non-deterministic and aperiodic.: True Random Number
Generators (TRNGs)
9. Cipher cracking methodology that involves identifying
patterns and varia- tions in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the
beginning of a string too often could tip us off that those
three letters correlate the letters THE in the English
alphabet.: Frequency Analysis
10. measures level of unpredictability: Entropy
11. Two common binary to characters encoding methods:
ASCII (8bit value, up to 256 characters)
UTF-16 (16bit values, up to 65,536 characters)
, 12. 8 bit value, up to 256 characters: ASCII
13. 16 bit value, up to 65,536 characters: UTF-16
14. Tamper-evident and intrusion-resistant physical device
that safeguards and manages cryptographic keys and
provides cryptographic processing.: - Hardware Security
Module (HSM)
15. Which encryption is more efficient?: Hardware
16. Dedicated processor that handles hardware-level
encryption; allows the use of full disk encryption on a hard
drive in a manner that minimizes the impact on system
performance.
Contains the encryption keys.: Trusted platform module (TPM)
17. value which only has factors of 1 and itself: Prime Number
18. Determine the likelihood of an event happening, typically
by understanding the chances of how each of the elements
involved in an event interact, and the likelihood of them