Question
click below
click below
Question
Normal Size Small Size show me how
Chapter 11
Question | Answer |
---|---|
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES | Advanced Encryption Standard |
Procedures based on a mathematical formula; used to encrypted data | algorithm |
Encryption that uses two mathematically related keys | Asymmetric cryptographic algorithm |
A cipher that manipulates an entire block of plaintext at one time | Block cipher |
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits | Blowfish |
Unencrypted data | Cleartext |
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it | Cyptopgraphy |
The process of changing ciphertext into plaintext | Decryption |
AN electronic verification of the sender | Digital Signature |
The process of changing plaintext into ciphertext | encryption |
The unique digital fingerprint created by a hashing processor | Hash |
A Variation of a has that encrypts the has with a shared secret key before transmitting it | HMAC |
The process for creating a unique digital fingerprint signature for a set of data | hashing |
A common has algorithm of several different versions | Message Digest |
A revision of MD4 that is designed to address its weakness | Message Digest 5 |
Data input into an encryption algorithm | Plaintext |
An asymmetric encryption key that does have to be protected | Private Key |
An asymmetric encryption key that does not have to be protected | Public Key |
An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys | Quantum Cryptography |
A secure has algorithm that creates has values of longer lengths than MD algorithms | Secure Hash Algorithm |