Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
44 Cards in this Set
- Front
- Back
Advanced Encryption Standard(AES):
|
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
|
|
algorithm:
|
Procedures based on a mathematical formula; used to encrypt data.
|
|
asymmetric cryptographic algorithm:
|
Encryption that uses two mathematical related keys.
|
|
block cipher:
|
A cipher that manipulates an entire block of plain text at one time.
|
|
Blowfish:
|
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits
|
|
ciphertext:
|
Data that has been encrypted
|
|
cleartext:
|
Unencrypted data
|
|
cryptography:
|
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it.
|
|
Data Encryption Standard(DES):
|
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks.
|
|
decryption:
|
The process of changing ciphertext into plaintext
|
|
digital signature:
|
An electronic verification of the sender
|
|
elliptic curve cryptography (ECC):
|
An algorithm that uses elliptic curves instead of prime numbers to compute keys.
|
|
encryption:
|
The process of changing plaintext into ciphertext:
|
|
GNU Privacy Guard(GPG):
|
Free and open-source software that is commonly used to encrypt and decrypt e-mail messages.
|
|
Hardware Security Module(HSM):
|
A secure cryptographic processor.
|
|
hash:
|
The unique digital fingerprint created by a hashing algorithm.
|
|
Hashed Message Authentication Code (HMAC)
|
A variation of a hash that encrypts the hash with a shared secret key before transmitting it.
|
|
hashing:
|
The process for creating a unique digital fingerprint signature for a set of data.
|
|
key:
|
A mathematical value entered into the algorithm to produce cipher text.
|
|
message Digest(MD):
|
A common hash algorithm of several different versions.
|
|
Message Digest 5 (MD5):
|
A revision of MD4 that is designed to address its weaknesses.
|
|
nonrepudiation:
|
The process of proving that a user performed an action.
|
|
NTLM(New Technology LAN Manager)hash
|
A password hash for Microsoft Windows systems that is no longer recommended for use.
|
|
NTLMv2(New Technology LAN Manger version 2)hash
|
An updated version of NTLM that uses HMAC with MD5
|
|
ont time pad:
|
Using a unique truly random key to create ciphertxt
|
|
plainttext:
|
Data input into an encryption algorithm.
|
|
Pretty good Privacy(PGP):
|
A commercial product that is commonly used to encrypt e-mail messages
|
|
private key:
|
An asymmetric encryption key that does have to be protected.
|
|
private key cryptography:
|
Cryptographic algorithms that use a single key to encrypt and decrypt a message.
|
|
public key:
|
An asymmetric encryption key that does not have to be protected.
|
|
public key cryptography:
|
Encryption that uses two mathematically related keys.
|
|
quantum cryptography:
|
An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.
|
|
RACE integrity Primitives Evaluation Message Digest(RIPEMD):
|
A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process.
|
|
RC4:
|
An RC stream cipher that will accept keys up to 128 bits in length
|
|
River Cipher(RC):
|
A family of cipher algorithms designed by Ron Rivest.
|
|
RSA
|
An asymmetric algorithm published in 1977 and patented by MIT in 1983
|
|
Secure Hash Algorithm(SHA):
|
A secure hash algorithm that creates hash values of longer length than Message Digest (MD) algorithms.
|
|
Steganography:
|
Hiding the existence of data within a text, audio, image, or video file.
|
|
Stream cipher:
|
An algorithm that takes one character and replaces it with one character.
|
|
symmetric cryptographic algorithm:
|
Encryption that uses a single key to encrypt and decrypt a message.
|
|
Triple Data Encryption Standard(3DES):
|
A symmetric cipher that was designed to replace DES.
|
|
TPM:
|
A chip on the motherboard of the computer that provide cryptographic services.
|
|
twofish:
|
A later derivation of the blowfish algorithm that is considered to be strong.
|
|
whole disk encryption:
|
Cryptography that can be applies to entire disk.
|