click below
click below
Normal Size Small Size show me how
Chapter 5 Terms
Terms for chapter 5
Term | Definition |
---|---|
advanced encryption standard | a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES |
algorithm | procedures based on a mathematical formula used to encrypt and decrypt the data |
asymmetric cryptographic algorithm | crypography that uses two mathematically related keys |
block cipher | a cipher that manipulates an entire block of plaintext at one time |
blowfish | a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits |
ciphertext | data that has been encrypted |
cleartext | unencrypted data |
cryptography | the science of transforming information into a secure form so that unauthorized persons cannot access it |
data encryption standard | a symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks |
decrption | the process of changing ciphertext into plaintext |
diffie-hellman | a key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be seperately created |
diffie-hellman ephemeral | a diffie-hellman key exchange that uases different keys |
digest | the unique digital fingerprint created by one way hash algorithm |
digital signature | an electronic verification of the sender |
elliptic curve cryptography | an alorithm that uses elliptic curves instead of prime numbers to computer keys |
elliptic curve diffie-hellman | a diffie-hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation |
encryption | the process of changing plaintext into ciphertext |
ephemeral key | a temporary key that is used only once before it is discarded |
gnu privacy guard | free and open source software that is commonly used to encrypt and decrypt data |
hardware security module | a secure cryptographic processor |
hash | an algorithm that creates a unique digital fingerprint |
hashed message authentication code | a hash function that is applied to both they key and the message |
in-band | exchaging secure information within normal communication channels |
key | a mathematical value enterd into a cryptographic algorithm to produce encrypted data. |
key exchange | the process of sending and receiving secure cryptographic keys |
message digest | a common hash algorithm with several different versions |
non-repudiation | the process of proving that a user performed an action |
one time pad | combining plaintext with a random key to create ciphertext that cannot be broken mathematically |
out of band | exchanging secure informtion outside the normal communication channels |
perfect forward secrecy | public key systems that generate random public keys that are different for each session |
plaintext | cleartext data that is to be encrypted and decrypted by a cryptographic algorithm |
pretty good privacy | a commercial product that is commonly used to encrypt files and messages |
private key | an asymmetric encryption key that does have to be protected |
private key cryptography | cryptographic algorithms that use a single key to encrypt and decrypt a message |
public key | an asymmetric encryption key that does not have to be protected |
public key cryptography | cryptography that uses two mathematically related keys |
quantum cryptography | a type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys |
race integrity primitives evaluation message digest | a hash algorthm that uses two different and independent parallel chains of computation and then combines the result at the end of the process |
RC4 | an RC stream cipher that will accept keys up to 128 bits in length |
RSA | the most common asymmetric cryptography algorithm |
secure hash algorithm | a secure hash algorithm that creates more secure hash values than message digest algorithms |
sponge function | a crypographic function that applies a process on the input that has been padded with additional characters until all characters are used |
steganography | hiding the existence of data within another type of file |
stream cipher | an algorithm tht takes one character nd replaces it with one character |
symmetric cryptographic algorithm | encryption that uses a single key to encrypt and decrypt a message |
triple data encryption standard | a symmetric cipher that was designed to replace DES |
trusted platform module | a chip on the motherboard of the computer that provides cryptographic services |
twofish | a derivation of the blowfish algorithm that is considered to be strong |
whole disk encryption | cryptography that can be applied to entire disks |