click below
click below
Normal Size Small Size show me how
Chapter 8 Terms
Security+ SY0-501 7th Edition Terms (Chapter 8)
Question | Answer |
---|---|
asymmetric cipher | Cryptographic algorithms that use two different keys—one key to encrypt and another to decrypt. Also called public key cryptography. |
Challenge Handshake Authentication Protocol (CHAP) | An authentication protocol that periodically reauthenticates. |
collision | When two different inputs into a cryptographic hash produce the same output, this is known as a collision. |
cryptographic hash | A function that is one-way (nonreversible), has a fixed length output, and is collision resistant. |
PRNG | A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes. |
rainbow table | A table of precomputed hashes used to guess passwords by searching for the hash of a password. |
salt | Bits added to a hash to make it resistant to rainbow table attacks. |
symmetric cipher | Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples. |
X.509 | The X.509 standard is the most widely used standard for digital certificates. |