click below
click below
Normal Size Small Size show me how
Comp
| Term | Definition |
|---|---|
| Encryption | Process of converting plaintext into ciphertext using a key |
| Decryption | Process of converting ciphertext back into plaintext |
| Plaintext | Original readable data before encryption |
| Ciphertext | Encrypted data that appears meaningless |
| Encryption Key | Value used by an algorithm to encrypt or decrypt data |
| Symmetric Key Cryptography | Same secret key used for encryption and decryption |
| Asymmetric Key Cryptography | Uses a pair of keys: public key and private key |
| Public Key | Key shared openly for encryption or verification |
| Private Key | Secret key used for decryption or signing |
| Key Exchange | Secure method of sharing encryption keys |
| Authentication | Verifying the identity of a sender or system |
| Confidentiality | Ensuring data is only accessible to authorised users |
| Integrity | Ensuring data has not been altered in transit |
| repudiation | Preventing a sender from denying they sent a message |
| Verified Message | Message whose sender’s identity can be confirmed |
| Private Message | Message that only the intended recipient can read |
| Hash | Fixed length output generated from data for integrity checking |
| Digital Signature | Encrypted hash used to verify authenticity and integrity |
| Quantum Cryptography | Key exchange method using quantum mechanics |
| Quantum Key Distribution (QKD) | Secure key sharing that detects interception |
| Advantage of Quantum Cryptography | Interception attempts are detectable |
| Disadvantage of Quantum Cryptography | High cost and specialised equipment required |
| SSL (Secure Sockets Layer) | Protocol for encrypting network communication |
| TLS (Transport Layer Security) | Modern, more secure replacement for SSL |
| SSL/TLS | Protocols that provide encrypted, authenticated communication |
| Client | Device or software requesting a service |
| Server | Device or software providing a service |
| Server Communication | Data exchange between client and server |
| Secure Connection | Encrypted communication channel |
| Digital Certificate | Electronic document proving identity and public key |
| Certificate Authority (CA) | Trusted organisation that issues digital certificates |
| Public Key Infrastructure (PKI) | System managing digital certificates and keys |
| Certificate Verification | Checking validity of a digital certificate |
| HTTPS | HTTP protocol secured using SSL/TLS |