• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back
Advanced Encryption Standard(AES):
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
algorithm:
Procedures based on a mathematical formula; used to encrypt data.
asymmetric cryptographic algorithm:
Encryption that uses two mathematical related keys.
block cipher:
A cipher that manipulates an entire block of plain text at one time.
Blowfish:
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits
ciphertext:
Data that has been encrypted
cleartext:
Unencrypted data
cryptography:
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it.
Data Encryption Standard(DES):
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks.
decryption:
The process of changing ciphertext into plaintext
digital signature:
An electronic verification of the sender
elliptic curve cryptography (ECC):
An algorithm that uses elliptic curves instead of prime numbers to compute keys.
encryption:
The process of changing plaintext into ciphertext:
GNU Privacy Guard(GPG):
Free and open-source software that is commonly used to encrypt and decrypt e-mail messages.
Hardware Security Module(HSM):
A secure cryptographic processor.
hash:
The unique digital fingerprint created by a hashing algorithm.
Hashed Message Authentication Code (HMAC)
A variation of a hash that encrypts the hash with a shared secret key before transmitting it.
hashing:
The process for creating a unique digital fingerprint signature for a set of data.
key:
A mathematical value entered into the algorithm to produce cipher text.
message Digest(MD):
A common hash algorithm of several different versions.
Message Digest 5 (MD5):
A revision of MD4 that is designed to address its weaknesses.
nonrepudiation:
The process of proving that a user performed an action.
NTLM(New Technology LAN Manager)hash
A password hash for Microsoft Windows systems that is no longer recommended for use.
NTLMv2(New Technology LAN Manger version 2)hash
An updated version of NTLM that uses HMAC with MD5
ont time pad:
Using a unique truly random key to create ciphertxt
plainttext:
Data input into an encryption algorithm.
Pretty good Privacy(PGP):
A commercial product that is commonly used to encrypt e-mail messages
private key:
An asymmetric encryption key that does have to be protected.
private key cryptography:
Cryptographic algorithms that use a single key to encrypt and decrypt a message.
public key:
An asymmetric encryption key that does not have to be protected.
public key cryptography:
Encryption that uses two mathematically related keys.
quantum cryptography:
An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.
RACE integrity Primitives Evaluation Message Digest(RIPEMD):
A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process.
RC4:
An RC stream cipher that will accept keys up to 128 bits in length
River Cipher(RC):
A family of cipher algorithms designed by Ron Rivest.
RSA
An asymmetric algorithm published in 1977 and patented by MIT in 1983
Secure Hash Algorithm(SHA):
A secure hash algorithm that creates hash values of longer length than Message Digest (MD) algorithms.
Steganography:
Hiding the existence of data within a text, audio, image, or video file.
Stream cipher:
An algorithm that takes one character and replaces it with one character.
symmetric cryptographic algorithm:
Encryption that uses a single key to encrypt and decrypt a message.
Triple Data Encryption Standard(3DES):
A symmetric cipher that was designed to replace DES.
TPM:
A chip on the motherboard of the computer that provide cryptographic services.
twofish:
A later derivation of the blowfish algorithm that is considered to be strong.
whole disk encryption:
Cryptography that can be applies to entire disk.