click below
click below
Normal Size Small Size show me how
Ch. 5 Key Terms
Chapter 5 Security Terms
Term | Definition |
---|---|
Advanced Encryption Standard (AES) | A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES. |
Algorithm | Cryptography that uses two mathematically related keys. |
Asymmetric cryptographic algorithm | Cryptography that uses two mathematically related keys. |
Block cipher | A cipher that manipulates an entire block of plaintext at one time. |
Blowfish | A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits. |
Ciphertext | Data that has been encrypted |
Cleartext | Unencrypted data |
Cryptography | The science of transforming information into a secure form so that unauthorized persons cannot access it |
Data encryption standard (DES) | A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks |
Decryption | The process of changing cipher text into plaintext |
Diffie-Hellman (DH) | A Diffie-Hellman key exchange that uses different keys |
Diffie-Hellman Enphermeral | A diffie hellman key exchange that uses different keys |
digest | the unique digital fingerprint created by a one way hash algorithm |
digital signature | an electronic verification of the sender |
elliptic curve cryptography | an algorithm that uses elliptic curves instead of prime numbers to compute keys |
elliptic curve diffie hellman | a diffie hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation |
encryption | the process of changing plaintext into ciphertext |
encryption | the process of changing plaintext into ciphertext |
ephemeral key | a temporary key that is used only once before it is discarded |
gnu privacy guard | free and open source software that is commonly used to encrypt and decrypt data |
hard ware security module | a secure cryptographic processor |
hash | an algorithm that creates a unique digital fingerprint |
hashed message authentication code | a hash function that is applied to both the key and the message |
in band | exchanging secure information within normal communication channels |
key | a mathematical value entered into a cryptographic algorithm to produce encrypted data |
key exchange | the process of sending and receiving secure cryptographic keys |
message digest | a common hash algorithm with several different versions |
message digest 5 | the current version of md |
non reputation | the process of proving that a user performed and action |
one time pad | combining plaintext with a random key to create cipher text that cannot be broken mathematically |
out of band | exchanging secure information outside the normal communication channels |
perfect forward securitty | public key system that generate random public keys that are different for each session |
plaintext | cleartext data that is to be encrypted and decrypted by a cryptographic |
pretty good privacy | a commercial product that is commonly used to encrypt files and messages |
private key | an asymmetric encryption key that does have to be protected |
private key cryptography | cryptographic algorithms that use a single key to encrypt and decrypt a message |
public key | an asymmetric encryption key that does not have to be protected |
public key cryptography | cryptography that uses two mathematically related keys |
quantum cryptography | a type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys |
race integrity primitives evaluation message digest | a hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process |
rc4 | an rc stream cipher that will accept keys up to 128 bits in length |
rsa | the most common asymmetric cryptography algorithm |
secure hash algorithm | a secure hash algorithm that creates |
sponge function | a cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used |
steganography | hiding the existence of data within another type of file |
stream cipher | an algorithm that takes one character and replaces it with one character |
symmetric cryptographic algorithm | encryption that uses a single key to encrypt and decrypt a message |
triple data encryption standard | a symmetric cipher that was designed to replace des |
trusted platform module | a chip on the motherboard of the computer that provides cryptographic services |
twofish | a derivation of the blowfish algorithm that is considered to be strong |
whole disk encryption | cryptography that can be applied to entire disks |