Smallest unit of information
What is a bit?
MACs are used to do this
What is make sure a message is legitimate?
Encrypt the following using a Caesar Cipher with a shift of 7:
POTATO FOODS
What is WVAHAV MVVKZ?
Symmetric Key Cryptography is also called this cryptography
What is private key?
What is frequency analysis?
8 bits
What is a byte?
This lets the receiver confirm the sender
What is a Digital Signature?
Decrypt the following using a Caesar Cipher shift of 3:
WRGDB LV WXHVGDB
What is TODAY IS TUESDAY?
Public keys are stored and managed by these
What are public key infrastructures?
If you do any crypto operation before checking the MAC, it is called this
What is the Cryptographic Doom Principle?
American Standard Code for Information Interchange
What is ASCII?
Two inputs with the same output
What is a hash function?
Encrypt the following using a Caesar cipher, key = 4:
my favorite color is red
What is qc jezsvmxi gspsv mw vih?
This type of key exchange is mainly used to derive keys
What is the Diffie-Hellman Key Exchange?
A random string attached to plaintext
What is a salt?
What are bitwise operators?
Authenticated Encryption does this with the MAC
What is Enc-then-MAC?
Decrypt the following using a Caesar cipher, key = 9:
r anjuuh fjwc j mxp
What is i really want a dog?
This encryption uses two keys instead of 1
Computers use this to create pseudorandom numbers
What is a seed?
Most Significant Bit
What is the right-most bit?
This means it is hard to find two different inputs that yield the same output
What is collision resistance?
This attack is used on a Two-Time Pad
What is crib-dragging?
This block cipher mode of operation is not great because it can leak information about data
What is Electronic Code Book (ECB)?
Changing one thing in the key changes everything in the ciphertext
What is confusion?