click below
click below
Normal Size Small Size show me how
Chapter 8 Terms
Security+ SY0-501 7th Edition Terms (Chapter 8)
| Question | Answer |
|---|---|
| asymmetric cipher | Cryptographic algorithms that use two different keys—one key to encrypt and another to decrypt. Also called public key cryptography. |
| Challenge Handshake Authentication Protocol (CHAP) | An authentication protocol that periodically reauthenticates. |
| collision | When two different inputs into a cryptographic hash produce the same output, this is known as a collision. |
| cryptographic hash | A function that is one-way (nonreversible), has a fixed length output, and is collision resistant. |
| PRNG | A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes. |
| rainbow table | A table of precomputed hashes used to guess passwords by searching for the hash of a password. |
| salt | Bits added to a hash to make it resistant to rainbow table attacks. |
| symmetric cipher | Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples. |
| X.509 | The X.509 standard is the most widely used standard for digital certificates. |