click below
click below
Normal Size Small Size show me how
Chapter 5 Security
Roberts Class
| Term | Definition |
|---|---|
| AES | Advanced Encryption Standard |
| Algorithm | Procedures based on a mathematical formula used to encrypt and decrypt the data |
| Asymmetric Crytographic algorithm | Cryptography that used two mathematically related keys |
| Block Cipher | A cipher that manipulates an entire block of plain text at one time |
| Cipher Text | Data that has been encrypted |
| Cleartext | unencrypted data |
| Cryptography | The science of transforming information into a secure form so that unauthorized persons cannot access it |
| DES | Data Encryption Standard |
| Decryption | The process of changing cipher text into plain text |
| Diffie Hellman | A key exchange that requires all parties to agree upon a large prime number and related integar so that same key can be seperatly created |
| Diffie Hellman Ephemeral | A diffie hellman exchange that uses different keys |
| Digest | The unique digital fingerprint created by a one way hash algorithm |
| Digital signature | An electronic verification of the sender |
| Elliptic Curve Cryptography | An algorithm that uses elliptic curves instead of prime numbers to create keys |
| ECDH | Elliptic Curve Diffie Hellman |
| Encyrption | the process of changing plain text into cipher text |
| Ephemeral Key | A temporary key that is used only once before it is discarded |
| GNU Privacy Guard | Free and open source software that is commonly used to encrypt and decrypt data |
| Hardware Security Guard | A secure cryptographic processor |
| Hash | an algorithm that creates a unique digital fingerprint |
| Hashed Message Authentication Code | A hash function that is applied to both the key and the message |
| In Band | Exchanging secure information within normal communication channels |
| Key | A mathematical value entered into a cryptographic algorithm to produce encrypted data |
| Key Exchange | The process of sending and receiving secure cryptographic keys |
| Message Digest | A common hash algorithm with several different versions |
| Message Digest 5 | The version of MD |
| Non- Repudiation | The process of proving that a user performed an action |
| One Time Pad | Combining plain text with a random key to create ciphertext that cannot be broken mathematically |
| Out of Band | Exchanging secure information outside the normal communication channels |
| Perfect Forward Secrecy | Public key systems that generate random public keys that are different for each session |
| Plain Text | Cleartext data that is to be encrypted and decrypted by a cryptographic |
| Pretty Good Privacy | A commercial product that iss commonly used to encrypt files and messages |
| Private Key | An asymetric encryption key that does have to be protected |
| Private Key Cryptography | Cryptographic algorithm that use a single key to encrypt and decrypt a message |
| Public Key | An asymmetric encryption key that does not have to be protected |
| Public Key Crytography | Crytography that uses two mathmatically related keys |
| Quantum Cryptography | A type of asymmetric cryptograpgt that attempts to use the unusual and unique behavior of microscopic onjects to enable uses to secretly develop and share keys |
| RIPEMD | RACE Integrity Primitives Evaluation Message Digest |
| RC4 | An RC stream cipher that will accept keys up to 128 bits in length |
| RSA | The most common asymmetric Cryptography algorithm |
| Secure Hash Algorithm | A secure hash algorithm that creates more secure hash values than message Digest algorithms |
| Sponge Function | A cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used |
| Steganography | Hiding the exsistense of data wihtin another type of file |
| Stream Cipher | An algorithm that takes one character and replaces it with one character |
| Symmetric Cryptographic Algorithm | Encryption that used a single key to encrypt and decrypt a message |
| Triple Data Encryption Standard | A symmetric cipher that was designed to replace des |
| Trusted Platform Module | A chip on the motherboard of the computer that provides cryptographic services |
| Twofish | A derivation of the blowfish algorithm that is considered strong |
| Whole Disk Encryption | Cryptography that can be applied to entire disks |