Is a process that reverses encryption taking a secret message and reproducing the original plain text?

focusNode

Didn't know it?
click below

Knew it?
click below

Is a process that reverses encryption taking a secret message and reproducing the original plain text?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

TermDefinition
Moore's Law the observation that computing power roughly doubles every two years.
Big Data a broad term for datasets so large or complex that traditional data processing applications are inadequate.
One-pager A business/corporate term for a one-page document that summarizes a large issue, topic or plan.
Encryption a process of encoding messages to keep them secret, so only "authorized" parties can read it.
Decryption a process that reverses encryption, taking a secret message and reproducing the original plain text
Cipher the generic term for a technique (or algorithm) that performs encryption
Caesar's Cipher a technique for encryption that shifts the alphabet by some number of characters.
Random Substitution Cipher an encoding technique that maps each letter of the alphabet randomly to different letters or characters.
Cracking encryption When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
Vigenère cipher a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.
Computationally Hard a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
Modulo (or "mod") the name of the mathematical operation.
Asymmetric encryption a type of cryptographic based on algorithms that require two keys -- one of which is secret (or private) and one of which is public (freely known to others).
Public key a value that can be used to encrypt a message. However, only when combined with a mathematically-related private key, can the message be decrypted.
Private key the complementary key to a public key that is used to decrypt a message.
Antivirus Software usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
DDoS Attack Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
Firewall software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Phishing Scam a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.
SSL/TLS Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection.
Virus a program that runs on a computer to do something the owner of the computer does not intend.


focusNode

Didn't know it?
click below

Knew it?
click below

Is a process that reverses encryption taking a secret message and reproducing the original plain text?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

tech

QuestionAnswer
encryption a process of encoding messages to keep them secret, so only authorised parties can see it
decryption a process that reverses encryption, taking a secret message and reproducing the original plain text
cipher the generic term for a technique (or algorithm) that performs encryption
caesar's cipher a technique used for encryption that shifts the alphabet by some number of characters
cracking encryption when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption
symmetric encryption uses a secret key known by the sender and receiver to encrypt a message. the same key is used to both encrypt and decrypt a message
asymmetric encryption two different keys known by only the receiver are required - a public and a private key. the receiver shares the public key with the sender so they can encrypt their message to be sent to the receiver
information system digital systems that have been combined with data, processes and people to collect, organise and communicate information
hardware components of an information system input, output, storage, processing and control
input collects data from the outside world
output communicated data from the computer's CPU to users

What is the process of encoding messages to keep them secret?

Terms in this set (34).
Encryption. a process of encoding messages to keep them secret, so only "authorized" parties can read it..
Decryption. ... .
Cipher. ... .
Caesar's Cipher. ... .
Random Substitution Cipher. ... .
Cracking encryption. ... .
List 3 characteristics of the ideal encryption scheme. ... .
The Caesar Cipher has 25 different shifts to try..

What type of encryption involves one key for both encryption and decryption?

Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.

How does encryption work?

Encryption uses complex mathematical algorithms and digital keys to encrypt data. An encryption algorithm (cipher) and an encryption key encode data into ciphertext. Once the ciphertext is transmitted to the recipient, the same or different key (cipher) is used to decode the ciphertext back into the original value.

Is a technique for encryption that shifts the alphabet by some number of characters?

The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters, historically three, as shown in Figure 5.1.