Summary: Cryptographic Security

Study material generic cover image
  • This + 400k other summaries
  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
PLEASE KNOW!!! There are just 45 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.
Use this summary
Remember faster, study better. Scientifically proven.
Trustpilot Logo

Read the summary and the most important questions on Cryptographic Security

  • 1 Security and cryptography

    This is a preview. There are 5 more flashcards available for chapter 1
    Show more cards here

  • How does one formulate risk?

    Risk= Likelihood x damage
  • How does one formulate likelihood?

    likelihood=  threat x vulnerability
  • what are security requirements?

    precise descriptions of acceptable levels of security à should be formulated before security measures are taken.
  • What is data integrity?

    the requirement that the data itself is not modified
  • 1.5 Kerckhoff's Principle

    This is a preview. There are 1 more flashcards available for chapter 1.5
    Show more cards here

  • What is Kerckhoff's Principle?

    prescribes that any cryptographic system should stay entirely secure even if it falls into the hands of the enemy. 
  • What is proprietary cryptography?

    a secret algorithm
  • 1.6 Cryptanalysis

    This is a preview. There are 2 more flashcards available for chapter 1.6
    Show more cards here

  • What is a Key space exhaustion attack/ brute force attack

    try out the decryption algorithm with all possible keys and see if some outcome produces understandable text --> when the key space is small this is not that hard.
  • 2 Symmetric Cryptography

  • 2.1 Introduction, bits and bytes

    This is a preview. There are 3 more flashcards available for chapter 2.1
    Show more cards here

  • What means symmetric cryptography?

    The symmetry refers to the fact that the same key is used to encrypt and decrypt.
  • What is a big advantage of symmetric cryptography?

    these systems can be designed with speed in mind: very high performance is possible.
  • 3 Asymmetric Cryptography

  • 3.1 Introduction: Public Key Encryption

    This is a preview. There are 4 more flashcards available for chapter 3.1
    Show more cards here

  • What are the advantages of Asymmetric cryptography?

    ·No trusted channel is needed at all
    ·It is very well scalable. The number of keys is not quadratic anymore but linear.
PLEASE KNOW!!! There are just 45 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.

To read further, please click:

Read the full summary
This summary +380.000 other summaries A unique study tool A rehearsal system for this summary Studycoaching with videos
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Topics related to Summary: Cryptographic Security