Term
|
Definition
System functioned by wrapping a strip of papyrus or leather around a rod of fixed diameter on which a message was written |
|
|
Term
|
Definition
Plain text was rotated by 3 letters (ex: cat was FDW) |
|
|
Term
CH 1
Privacy (Confidentiality) |
|
Definition
What is private should stay private, whether at rest or in transit |
|
|
Term
|
Definition
Proof that a message is from the person or entity we believe ti yo be from |
|
|
Term
|
Definition
Information should remain unaltered |
|
|
Term
|
Definition
Proof of delivery and recipient is assured of senders identity. |
|
|
Term
Ch1
Truecypt and Bitlocker |
|
Definition
Offer ability to encrypt HD |
|
|
Term
|
Definition
Clear text that is readable |
|
|
Term
|
Definition
Encrypted text atht is unreadable |
|
|
Term
|
Definition
Transforming data into an unreadable format. For example, using Ceasar's cipher to encrypt the word cat would result in fdw. Encryption here has moved each character forward three letters. |
|
|
Term
|
Definition
The act of obtaining plain text from cipher text without a cryptographic key. It is used by governments, the military, enterprised, ethical hackers, and malicious hackers to find weaknesses and crack cryptographic systems. |
|
|
Term
|
Definition
A hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity. |
|
|
Term
Ch1
Symmetric Cryptography |
|
Definition
This type uses a single private key |
|
|
Term
Ch1
Asymmetric Cryptography |
|
Definition
This type uses two keys: a public key know to everyone and a private key that only the recipient of messages uses. |
|
|
Term
|
Definition
mathematical procedure or function that coverts a large amount of data into a fixed samll string of data or integer. The output of a hash is known as a hash value, hash code, hash sum, checksum, fingerprint or message digest. |
|
|
Term
|
Definition
Function by dividing the message into blocks for processing |
|
|
Term
|
Definition
Functions by dividing the message into bits for processing. |
|
|
Term
|
Definition
How strong the encryption process is relies in part on the cryptograpic algorithm functions. It can be used to control the transformation of plain text to cipher text or cipher text to plain text. |
|
|
Term
|
Definition
Although key size is important, the randomness of the key is also critical. You may have been asked to create a random key before and not realized what you were actually doing. |
|
|