• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back

define Ciphertext

text that has been mathematically scrambled so that its meaning cannot be determined without decryption

define Encryption Key

input to the encryption algorithm that makes the encryption unique; reader must have the key

give the characteristics of Symmetrical Encryption

fast, easy and LESS secure


used in data stores (data at rest)


a.k.a. "single key encryption"


sender crates ciphertext and sends encrypted text to recipient

give the characteristics of Asymmetrical Encryption

safer but more complex


used for "data-in-motion"


a.k.a. "public/private-key encryption"


uses 2 paired encryption algorithms



**private must be used on one side and public on the other

how does a user acquire a public/private key pair?

applies to a Certificate Authority (CA)



-CA registers public key on its server and send private to user

define Quantum Encryption

uses the physical properties of light (photons) to generate seemingly uncrackable codes

define Digital Signature and explain how it works

electronic means of identifying a person or entity



-uses public/private key technology to authenticate


-authentication is based on the private key



*vulnerable to man-in-the-middle attacks: sender's private and public key are faked

define Digital Certificate

provides a legally recognized electronic identifation of the sender



-based on a Public Key infrastructure: manages cryptographic keys

define Certification Authority (CA)

manages and issues digital certificates & public keys; certifies ownership by user of certificate

2 most secure Internet Transmission Protocols

1. Secure Socket Layer (SSL): combo of encryption schemes based on a PKI (public key infrastructure)



2. Secure Hypertext Transfer Protocol (S-HTTP): directs messages to secure ports using SSI-like cryptography

define Secure Electronic Transaction (SET)

uses multiple encryption schemes based on a PKI


-used for online credit card transactions


-used by the intermediary between bank and customer

define VPN

secure way to connect to a private LAN from a remote location