__________ in simplest terms is changing plaintext into ciphertext; __________ is the process of changing it back. - Encryption; decryption, Encryption should be applied to information you want to protect __ ___ as well as __ ____. - at rest; in transit., You can use _______ to encrypt individual files. - Aescrypt, You can use _____ or _____ to encrypt full disks. - Bitlocker or FileVault, ______ code or substitution is where a single mapping from our alphabet to a cipher alphabet is created. - Mono-alphabetic, Many early cryptosystems used this. - Mono-alphabetic, Polyalphabetic refers to the mapping of our alphabet to a number of cipher alphabets. - Polyalphabetic, _______ is considered to be unbreakable since it only uses its cipher code once. - One-time pad, This method repeats the random numbers after a given time (periodic). They are fast and are also deterministic and are useful in producing a repeatable set of random numbers. - Pseudo-Random Number Generators (PRNGs)., This method generates a true random number and uses some form of random process. Monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Slow method, non-deterministic and aperiodic. - True Random Number Generators (TRNGs)., ____ ______ is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes. i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet. - Frequency Analysis, _______ measures level of unpredictability; in encryption relates to the degree of uncertainty of the encryption process.➢ Two common binary to characters encoding methods are ASCII (8-bit values, up to 256 characters) and UTF-16 (16- bit values, up to 65,536 characters). - Entropy, Hardware encryption is more efficient than software encryption - Hardware vs Software encryption., A tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing. - hardware security module (HSM), A dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. TPM contains the encryption keys. - trusted platform module (TPM),
0%
D334-Chapter 1 Recap
Share
Share
Share
by
Pmil274
College
Cryptology
CS
Edit Content
Print
Embed
More
Assignments
Leaderboard
Flash cards
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?