click below
click below
Normal Size Small Size show me how
Chapter 5 Terms
Terms for chapter 5
| Term | Definition |
|---|---|
| advanced encryption standard | a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES |
| algorithm | procedures based on a mathematical formula used to encrypt and decrypt the data |
| asymmetric cryptographic algorithm | crypography that uses two mathematically related keys |
| block cipher | a cipher that manipulates an entire block of plaintext at one time |
| blowfish | a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits |
| ciphertext | data that has been encrypted |
| cleartext | unencrypted data |
| cryptography | the science of transforming information into a secure form so that unauthorized persons cannot access it |
| data encryption standard | a symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks |
| decrption | the process of changing ciphertext into plaintext |
| diffie-hellman | a key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be seperately created |
| diffie-hellman ephemeral | a diffie-hellman key exchange that uases different keys |
| digest | the unique digital fingerprint created by one way hash algorithm |
| digital signature | an electronic verification of the sender |
| elliptic curve cryptography | an alorithm that uses elliptic curves instead of prime numbers to computer keys |
| elliptic curve diffie-hellman | a diffie-hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation |
| encryption | the process of changing plaintext into ciphertext |
| ephemeral key | a temporary key that is used only once before it is discarded |
| gnu privacy guard | free and open source software that is commonly used to encrypt and decrypt data |
| hardware security module | a secure cryptographic processor |
| hash | an algorithm that creates a unique digital fingerprint |
| hashed message authentication code | a hash function that is applied to both they key and the message |
| in-band | exchaging secure information within normal communication channels |
| key | a mathematical value enterd into a cryptographic algorithm to produce encrypted data. |
| key exchange | the process of sending and receiving secure cryptographic keys |
| message digest | a common hash algorithm with several different versions |
| non-repudiation | the process of proving that a user performed an action |
| one time pad | combining plaintext with a random key to create ciphertext that cannot be broken mathematically |
| out of band | exchanging secure informtion outside the normal communication channels |
| perfect forward secrecy | public key systems that generate random public keys that are different for each session |
| plaintext | cleartext data that is to be encrypted and decrypted by a cryptographic algorithm |
| pretty good privacy | a commercial product that is commonly used to encrypt files and messages |
| private key | an asymmetric encryption key that does have to be protected |
| private key cryptography | cryptographic algorithms that use a single key to encrypt and decrypt a message |
| public key | an asymmetric encryption key that does not have to be protected |
| public key cryptography | cryptography that uses two mathematically related keys |
| quantum cryptography | a type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys |
| race integrity primitives evaluation message digest | a hash algorthm that uses two different and independent parallel chains of computation and then combines the result at the end of the process |
| RC4 | an RC stream cipher that will accept keys up to 128 bits in length |
| RSA | the most common asymmetric cryptography algorithm |
| secure hash algorithm | a secure hash algorithm that creates more secure hash values than message digest algorithms |
| sponge function | a crypographic function that applies a process on the input that has been padded with additional characters until all characters are used |
| steganography | hiding the existence of data within another type of file |
| stream cipher | an algorithm tht takes one character nd replaces it with one character |
| symmetric cryptographic algorithm | encryption that uses a single key to encrypt and decrypt a message |
| triple data encryption standard | a symmetric cipher that was designed to replace DES |
| trusted platform module | a chip on the motherboard of the computer that provides cryptographic services |
| twofish | a derivation of the blowfish algorithm that is considered to be strong |
| whole disk encryption | cryptography that can be applied to entire disks |