1
DETAILED ANSWERS|LATEST
Changing plaintext into ciphertext (Should be applied in at rest and in transit) - ANSWER Encryption
Changing ciphertext to plaintext - ANSWER Decryption
Encrypt individual files and full disks with options such as BitLocker and FileVault - ANSWER Aescrypt
Mapping from our alphabet to a number of cipher alphabets.Added complexity in early cryptosystems. - ANSWER Polyalphabetic
Single mapping from our alphabet to a cipher alphabet is created.Many early cryptosystems. - ANSWER Mono-Alphabetic
Considered un-breakable since it only uses its cipher code once. - ANSWER One-Time Pad
Method repeats the random numbers after a given time. (periodic) They are fast and deterministic. 1 / 2
2
Useful in producing repeatable set of random numbers. - ANSWER Pseudo-Random Number Generators (PRNGs)
Method generates a true random number and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Overall, the method is generally slow, especially if it involves human interaction, but is non-deterministic and aperiodic. - ANSWER True Random Number Generators (TRNGs)
Cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet. - ANSWER Frequency Analysis
measures level of unpredictability - ANSWER Entropy
Two common binary to characters encoding methods - ANSWER ASCII (8bit value, up to 256 characters) UTF-16 (16bit values, up to 65,536 characters)
- bit value, up to 256 characters - ANSWER ASCII
16 bit value, up to 65,536 characters - ANSWER UTF-16
Tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing. - ANSWER Hardware Security Module (HSM)
- / 2