click below
click below
Normal Size Small Size show me how
Chapter 5 Security
Roberts Class
Term | Definition |
---|---|
AES | Advanced Encryption Standard |
Algorithm | Procedures based on a mathematical formula used to encrypt and decrypt the data |
Asymmetric Crytographic algorithm | Cryptography that used two mathematically related keys |
Block Cipher | A cipher that manipulates an entire block of plain text at one time |
Cipher Text | Data that has been encrypted |
Cleartext | unencrypted data |
Cryptography | The science of transforming information into a secure form so that unauthorized persons cannot access it |
DES | Data Encryption Standard |
Decryption | The process of changing cipher text into plain text |
Diffie Hellman | A key exchange that requires all parties to agree upon a large prime number and related integar so that same key can be seperatly created |
Diffie Hellman Ephemeral | A diffie hellman exchange that uses different keys |
Digest | The unique digital fingerprint created by a one way hash algorithm |
Digital signature | An electronic verification of the sender |
Elliptic Curve Cryptography | An algorithm that uses elliptic curves instead of prime numbers to create keys |
ECDH | Elliptic Curve Diffie Hellman |
Encyrption | the process of changing plain text into cipher text |
Ephemeral Key | A temporary key that is used only once before it is discarded |
GNU Privacy Guard | Free and open source software that is commonly used to encrypt and decrypt data |
Hardware Security Guard | A secure cryptographic processor |
Hash | an algorithm that creates a unique digital fingerprint |
Hashed Message Authentication Code | A hash function that is applied to both the key and the message |
In Band | Exchanging secure information within normal communication channels |
Key | A mathematical value entered into a cryptographic algorithm to produce encrypted data |
Key Exchange | The process of sending and receiving secure cryptographic keys |
Message Digest | A common hash algorithm with several different versions |
Message Digest 5 | The version of MD |
Non- Repudiation | The process of proving that a user performed an action |
One Time Pad | Combining plain text with a random key to create ciphertext that cannot be broken mathematically |
Out of Band | Exchanging secure information outside the normal communication channels |
Perfect Forward Secrecy | Public key systems that generate random public keys that are different for each session |
Plain Text | Cleartext data that is to be encrypted and decrypted by a cryptographic |
Pretty Good Privacy | A commercial product that iss commonly used to encrypt files and messages |
Private Key | An asymetric encryption key that does have to be protected |
Private Key Cryptography | Cryptographic algorithm that use a single key to encrypt and decrypt a message |
Public Key | An asymmetric encryption key that does not have to be protected |
Public Key Crytography | Crytography that uses two mathmatically related keys |
Quantum Cryptography | A type of asymmetric cryptograpgt that attempts to use the unusual and unique behavior of microscopic onjects to enable uses to secretly develop and share keys |
RIPEMD | RACE Integrity Primitives Evaluation Message Digest |
RC4 | An RC stream cipher that will accept keys up to 128 bits in length |
RSA | The most common asymmetric Cryptography algorithm |
Secure Hash Algorithm | A secure hash algorithm that creates more secure hash values than message Digest algorithms |
Sponge Function | A cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used |
Steganography | Hiding the exsistense of data wihtin another type of file |
Stream Cipher | An algorithm that takes one character and replaces it with one character |
Symmetric Cryptographic Algorithm | Encryption that used a single key to encrypt and decrypt a message |
Triple Data Encryption Standard | A symmetric cipher that was designed to replace des |
Trusted Platform Module | A chip on the motherboard of the computer that provides cryptographic services |
Twofish | A derivation of the blowfish algorithm that is considered strong |
Whole Disk Encryption | Cryptography that can be applied to entire disks |