Chapter 8 Principles of Information Security Exams and Answers Rated A+
2 views 0 purchase
Course
Chapter 8 Principles of Information Security
Institution
Chapter 8 Principles Of Information Security
Chapter 8 Principles of Information Security
Cryptoanalysis - Answer- The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption
cryptography - Answer- The process of making and using codes to secure information
Cyrt...
Chapter 8 Principles of Information
Security
Cryptoanalysis - Answer- The process of obtaining the plaintext message from a ciphertext
message without knowing the keys used to perform the encryption
cryptography - Answer- The process of making and using codes to secure information
Cyrtology - Answer- The field of science that encompasses cryptogoraphy and cryptanalysis
Mono-alphabetic substitution - Answer- a substitution cipher that only incorporates a single
alphabet in the encryption process
Poly-alphabetic Substitution - Answer- A substitution cipher that incorporates two or more
alphabets in the encryption process
Substitution Cipher - Answer- an encryption method in which one value is substituted for
another
Vignere Cipher - Answer- An advanced type of substitution cipher that uses a simple poly-
alphabetic code
Transposition cipher - Answer- A cryptographic operation that involves simply rearraging the
values within a block based on an established pattern. AKA permutation Cipher
Exclusive or Operation (XOR) - Answer- A function within boolean algera used as an
encryption function in which two bits are compared. If the two bits are dentical the result is
binary 0; otherwise the result is a binary 1.
Vernam Cipher - Answer- A cryptographic technique developed at AT&T and known as the
"One time pad" this cipher uses a set of charachters for encryption operations only one time
then discards it.
Hash Algorithm - Answer- Public functions that create a hash value, also known as a message
digest, by converting variable length messages into a single fixed length value
Hash functions - Answer- Mathematical algorithms that generate a message summary or
digest (fingerprint) to confirm message identity and integrity
Message authentication code (MAC) - Answer- A key dependent, one way hash function that
allows only specific recipients (Symmetric key holders) to access the message digest/
Message Digest - Answer- A value representing the application of a hash algorithm on a
message that is transmitted with the message so it can be compared with the recipients locally
calculated hash of the same message. if both hashes are identical after transmission, the
message has arrived without modification. AKA hash value
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Gurustudy. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.45. You're not tied to anything after your purchase.