The practice of securing information by transforming it into an unreadable format
Encryption converts plaintext to ciphertext; decryption converts ciphertext back to plaintext
An algorithm used to perform encryption or decryption
The original readable message before encryption
The encrypted message that appears scrambled or unreadable
A piece of information used by a cipher to encrypt or decrypt data
Encryption where the same key is used for both encryption and decryption
Encryption that uses a pair of keys - one public and one private
A substitution cipher that shifts each letter by a fixed number of positions in the alphabet
Advanced Encryption Standard - a widely used symmetric encryption algorithm
A public-key cryptosystem used for secure data transmission
A mathematical function that converts input data into a fixed-size string of characters
A cryptographic hash function that produces a 256-bit hash value
To verify the authenticity and integrity of digital messages or documents
The publicly shared key in asymmetric cryptography used for encryption or signature verification
The secret key in asymmetric cryptography used for decryption or signing
The process of securely sharing cryptographic keys between parties
A method for securely exchanging cryptographic keys over a public channel
An attack that tries all possible keys or passwords until the correct one is found
The study of methods for breaking cryptographic systems
A property ensuring that past communications remain secure even if long-term keys are compromised
Random data added to a password before hashing to prevent rainbow table attacks
The practice of hiding information within other non-secret data or media
A theoretically unbreakable cipher that uses a random key as long as the message
Authentication verifies identity; authorization determines what actions are permitted
Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!