Chapter 11 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES | Advanced Encryption Standard |
| Procedures based on a mathematical formula; used to encrypted data | algorithm |
| Encryption that uses two mathematically related keys | Asymmetric cryptographic algorithm |
| A cipher that manipulates an entire block of plaintext at one time | Block cipher |
| A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits | Blowfish |
| Unencrypted data | Cleartext |
| The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it | Cyptopgraphy |
| The process of changing ciphertext into plaintext | Decryption |
| AN electronic verification of the sender | Digital Signature |
| The process of changing plaintext into ciphertext | encryption |
| The unique digital fingerprint created by a hashing processor | Hash |
| A Variation of a has that encrypts the has with a shared secret key before transmitting it | HMAC |
| The process for creating a unique digital fingerprint signature for a set of data | hashing |
| A common has algorithm of several different versions | Message Digest |
| A revision of MD4 that is designed to address its weakness | Message Digest 5 |
| Data input into an encryption algorithm | Plaintext |
| An asymmetric encryption key that does have to be protected | Private Key |
| An asymmetric encryption key that does not have to be protected | Public Key |
| An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys | Quantum Cryptography |
| A secure has algorithm that creates has values of longer lengths than MD algorithms | Secure Hash Algorithm |
Created by:
neokute