Term
|
Definition
Hash value that has been encrypted with the senders private key. Ensures AUTHENTICITY and INTEGRITY of message. |
|
|
Term
A message that is encrypted provides what level of security services? |
|
Definition
|
|
Term
A message that is hased provides what level of security services? |
|
Definition
|
|
Term
A message that is digitally signed provides what level of security services? |
|
Definition
Authentication, Nonrepudiation and Integrity |
|
|
Term
A message that is encrypted and digitally signed provides what level of security services? |
|
Definition
Confindentiality, Authentication, Nonrepudiation and Integrity |
|
|
Term
Asymmetric Key Alogorithms |
|
Definition
RSA: Encrypt, Digital Sign & Key Distr ECC: Encrypt, Digital Sign & Key Distr Diffe-Hellman: Key Distro El Gamal: Encrypt, D Sign & Key Distr DSA: Digital Signature Knapsack: Encrypt, D Sign & Key Distr |
|
|
Term
Symmetric Key Alogorithms |
|
Definition
DES: Encryption 3DES: Encryption Blowfish: Encryption IDEA: Encryption RC4: Encryption SAFER: Encryption |
|
|
Term
|
Definition
MD2: Hashing Functions MD4: Hashing Functions MD5: Hashing Functions SHA Family: Hashing Functions HAVAL: Hashing Functions TIGER: Hashing Functions |
|
|
Term
Digital Signature Standard - DSS |
|
Definition
Developed in 1991 by NIST, RSA and DSA are best know and most widley used digital signature algorithms |
|
|
Term
|
Definition
First asymmetric alogorithm created and is used to exchange key values |
|
|
Term
|
Definition
De facto asymmetric algorithm used for encryption, digital signatures and key exchange |
|
|
Term
|
Definition
Aysmmetric algorithm based upon the Diffie-Hellman algorithm used for encryption, digital signatures and key exchange |
|
|
Term
Ellipic curve cryptosystem alogorithm |
|
Definition
Asymmetric alogorithm bsed on the algebraic structure of elicpic curves over finite curves. Used for encryption, digital signatures and key exchange |
|
|
Term
|
Definition
Aysmmetric algorithm based upon a subset sum problem (knapsack problem) It has been broken and is NO LONGER USED |
|
|
Term
|
Definition
One entity can prove something to be true without providing a secrect value |
|
|
Term
|
Definition
Cryptogrpahic process that takes an aribtrary amount of data and generates a fixed length value. Used for INTEGRITY protection |
|
|
Term
Message Authentication Code (MAC) |
|
Definition
Keyd cryptographic hash function used for data INTEGRITY and data origin AUTHENTICATION. |
|
|
Term
Hased Message Authentication Code (HMAC) |
|
Definition
Cryptographic hash function that uses a symmetrick key value and is used for data INTEGRITY and data origin AUTHENTICATION. |
|
|
Term
CBC-MAC = Cipher Block Chaining |
|
Definition
Cipher block chaining message authentication code uses encryption for data INTEGRITY and data origin AUTHENTICATION |
|
|
Term
CMAC - Cipher-Based Message Authentication Code |
|
Definition
Cipher message authentication code that is based upon and provides more security compared to CBC-MAC. |
|
|
Term
|
Definition
Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes |
|
|
Term
|
Definition
When two different messages are computed by the same hashing algorithm and the same message digest value results. |
|
|
Term
Public Key Infrastructure (PKI) |
|
Definition
Provides: Confidentiality Access Control Integrity Authentication Nonrepudiation |
|
|