Comp Sci Unit 4

Big Data

a broad term for datasets so large/complex that traditional data processing applications are inadequate.

Moore's Law

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years.

One-pager

a business/corporate term for a one-page document that summarizes a large issue, topic or plan.

Cipher

the generic term for a technique that performs encryption.

Caesar cipher

a technique for encryption that shifts the alphabet by some number of characters.

Cracking encryption

when you attempt to decode a secret message without knowing all the specifics of the cypher you are trying to crack.

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

Encryption

a process of encoding messages to keep them secret so only authorized parties can know about it.

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

Vigenere cipher

a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.

Computationally hard

a hard problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to encrypt.

modulo

a mathematical operation that returns the remainder after an integer division. Ex: 7MOD4 = 3

Private key

in an asymmetrical encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

Public key encryption

used on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a private key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Historically it has been observed that computer processing speeds tend to double every two years. This is known as:

Moore's Law

When a computer scientist uses the term "Big Data" what do they typically mean?

There is enough data that traditional data processing applications are inadequate.

Which of the following statements is the LEAST TRUE about personal data that technology companies potentially collect about their users?

Companies are required by law to give users options to personalize what data they collect about them.

What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message?

The number of characters to shift each letter in the alphabet.

The Caesar Cipher has 25 different shifts to try. How many possibilities are there to try in a random substitution cipher?

26 x 25 x 24 ... 3 x 2 x 1

List 3 characteristics of the ideal encryption scheme.

1) Ideal encryption scheme makes unique ciphertext
2) Based on the mathematical prediction
3) Ideal encryption Scheme considered to be very strong.

Why is the Vigenere cipher hard to crack? (select 2)

1. one cannot solve using frequency analysis directly.
2. the key length is variable and potentially very long.

What is the difference is between "cracking" a code and "decrypting" a message?

Cracking a code is when you attempt to decode a secret message without knowing all the specifics of the cipher and decryption is when you already know the key and are trying to reverse the process of encryption.

What is 20 MOD 15?

5

What is 13 MOD 17?

13

Big Data

a broad term for datasets so large/complex that traditional data processing applications are inadequate.

Moore's Law

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years.

One-pager

a business/corporate term for a one-page document that summarizes a large issue, topic or plan.

Cipher

the generic term for a technique that performs encryption.

Caesar cipher

a technique for encryption that shifts the alphabet by some number of characters.

Cracking encryption

when you attempt to decode a secret message without knowing all the specifics of the cypher you are trying to crack.

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

Encryption

a process of encoding messages to keep them secret so only authorized parties can know about it.

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

Vigenere cipher

a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.

Computationally hard

a hard problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to encrypt.

modulo

a mathematical operation that returns the remainder after an integer division. Ex: 7MOD4 = 3

Private key

in an asymmetrical encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

Public key encryption

used on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a private key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Historically it has been observed that computer processing speeds tend to double every two years. This is known as:

Moore's Law

When a computer scientist uses the term "Big Data" what do they typically mean?

There is enough data that traditional data processing applications are inadequate.

Which of the following statements is the LEAST TRUE about personal data that technology companies potentially collect about their users?

Companies are required by law to give users options to personalize what data they collect about them.

What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message?

The number of characters to shift each letter in the alphabet.

The Caesar Cipher has 25 different shifts to try. How many possibilities are there to try in a random substitution cipher?

26 x 25 x 24 ... 3 x 2 x 1

List 3 characteristics of the ideal encryption scheme.

1) Ideal encryption scheme makes unique ciphertext
2) Based on the mathematical prediction
3) Ideal encryption Scheme considered to be very strong.

Why is the Vigenere cipher hard to crack? (select 2)

1. one cannot solve using frequency analysis directly.
2. the key length is variable and potentially very long.

What is the difference is between "cracking" a code and "decrypting" a message?

Cracking a code is when you attempt to decode a secret message without knowing all the specifics of the cipher and decryption is when you already know the key and are trying to reverse the process of encryption.

What is 20 MOD 15?

5

What is 13 MOD 17?

13