What is the process of converting plaintext into ciphertext called?
What is encryption?
What kind of key is publicly available and used for encrypting messages in asymmetric encryption?
What is the public key?
This ancient civilization developed one of the earliest known encryption techniques called the Caesar Cipher.
What is Ancient Rome?
This method of securing sensitive data before storing it in a database ensures that even if the database is compromised, the data is unreadable.
What is encryption?
This one-way function is used to convert data into a fixed-length hash value.
What is hashing?
This type of encryption uses the same key for both encryption and decryption.
What is symmetric encryption?
What cryptographic key is kept secret and shared between two parties in symmetric encryption?
What is the secret key?
The Enigma machine was used by this country during World War II to encrypt military
What is Germany?
This common cryptographic technique ensures that a document has not been tampered with by comparing the original and the current hash values.
What is hashing?
This algorithm is used to generate a hash value and is commonly used for integrity checking in files.
What is SHA-256?
In asymmetric encryption, what key is used to decrypt the message
What is the private key?
This key is derived from a user's password and is used to encrypt data, but its security depends heavily on the strength of the chosen password.
What is a Password-Based Key?
In the 9th century, this Arabic scholar wrote the first known book on cryptanalysis.
Who is Al-Kindi?
In web browsers, this feature is indicated by a padlock icon and signifies that the communication between the client and server is encrypted.
What is HTTPS?
A cryptographic signature used to verify the authenticity of a message is called?
What is a digital signature?
This encryption method divides a message into blocks before encrypting it
What is block cipher encryption?
The process of generating a random and unique key for each communication session is called?
What is session key generation?
The deciphering of the Enigma code during World War II was largely attributed to this British mathematician.
Who is Alan Turing?
This technology allows individuals to verify the identity of a website or entity using a digital certificate issued by a trusted third party.
What is Public Key Infrastructure (PKI)?
This type of attack occurs when two different inputs produce the same hash output.
What is a collision attack?
This theoretically unbreakable encryption method uses a key that is as long as the message, truly random, used only once, and kept completely secret.
What is the One-Time Pad?
RSA, a common encryption algorithm, relies on the difficulty of factoring what mathematical entities?
What are large prime numbers?
The Navajo code talkers used their native language as a form of encryption during this major conflict.
What is World War II?
This process involves encrypting data at rest and in transit to ensure that it cannot be accessed by unauthorized users, even when stored or transmitted.
What is end-to-end encryption?
This cryptographic process involves both a hash and encryption to sign a document securely.
What is HMAC (Hash-Based Message Authentication Code)?