click below
click below
Normal Size Small Size show me how
Chapter 11
| Question | Answer |
|---|---|
| A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES | Advanced Encryption Standard |
| Procedures based on a mathematical formula; used to encrypted data | algorithm |
| Encryption that uses two mathematically related keys | Asymmetric cryptographic algorithm |
| A cipher that manipulates an entire block of plaintext at one time | Block cipher |
| A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits | Blowfish |
| Unencrypted data | Cleartext |
| The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it | Cyptopgraphy |
| The process of changing ciphertext into plaintext | Decryption |
| AN electronic verification of the sender | Digital Signature |
| The process of changing plaintext into ciphertext | encryption |
| The unique digital fingerprint created by a hashing processor | Hash |
| A Variation of a has that encrypts the has with a shared secret key before transmitting it | HMAC |
| The process for creating a unique digital fingerprint signature for a set of data | hashing |
| A common has algorithm of several different versions | Message Digest |
| A revision of MD4 that is designed to address its weakness | Message Digest 5 |
| Data input into an encryption algorithm | Plaintext |
| An asymmetric encryption key that does have to be protected | Private Key |
| An asymmetric encryption key that does not have to be protected | Public Key |
| An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys | Quantum Cryptography |
| A secure has algorithm that creates has values of longer lengths than MD algorithms | Secure Hash Algorithm |