Term
|
Definition
encryption scheme where words and phrases in the P.T. message are replaced with words, numbers, or symbols, to create the C.T. message |
|
|
Term
|
Definition
A method of replacing symbols in a language or message for the purpose of transmitting or storing the message using a particular method; generally, widely published and is not intended to secure information |
|
|
Term
|
Definition
|
|
Term
|
Definition
encrypted form of the plain text message |
|
|
Term
|
Definition
Uses the same key for encryption and decryption. The key must be shared between the communicator prior to sending enciphered messages |
|
|
Term
|
Definition
uses different keys for encryption and decryption. These keys often take the form of key pairs where one key is published and the other key is private. |
|
|
Term
|
Definition
any organization established, usually by a government, for the purpose of performing cryptanalysis on foreign communications of interest. |
|
|
Term
|
Definition
a field cipher used by the Germans during World War II. The Enigma is one of the better known historical encryption machines, and it actually refers to a range of similar cipher machines |
|
|
Term
|
Definition
German rotor stream cipher machines used by the German Army during World War II |
|
|
Term
|
Definition
is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages |
|
|
Term
|
Definition
device or object needed to encrypt the message, example scytale |
|
|
Term
|
Definition
manual polyalphabetic substitution cipher system, invented in 1795 by Thomas Jefferson |
|
|
Term
|
Definition
Cylindrical device employing a tape to scramble the letters in a message |
|
|
Term
|
Definition
a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption. |
|
|
Term
|
Definition
a symmetric-key algorithm for the encryption of electronic data, a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time |
|
|
Term
|
Definition
a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. First described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. |
|
|
Term
|
Definition
substitution in cryptography that uses a single substitution alphabet so that each plaintext letter always has the same cipher equivalent |
|
|
Term
|
Definition
a system of substitution that mixes together a number of cipher alphabets in a cryptogram so that each plaintext letter is represented by a cipher that repeatedly changes |
|
|
Term
|
Definition
a polyalphabetic cipher because it uses two or more cipher alphabets to encrypt the data. |
|
|
Term
|
Definition
a pair of consecutive written units such as letters, syllables, or words |
|
|
Term
|
Definition
a group of three consecutive written units such as letters, syllables, or words |
|
|
Term
|
Definition
some piece of information employed by a cipher to guide the conversion of the P.T. to C.T. and vice versa |
|
|
Term
|
Definition
the set of all possible keys that can be used to initialize it |
|
|
Term
|
Definition
science of building new cryptosystems |
|
|
Term
|
Definition
science of discovering weaknesses in existing cryptosystems in order to retrieve the plaintext of a message without knowing the key |
|
|
Term
|
Definition
an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent. |
|
|
Term
|
Definition
means the cipher should hide all the local patterns or characteristics of the plaintext language |
|
|
Term
|
Definition
means that the cipher should mix up segments of the message so that no character remains in its original position |
|
|
Term
|
Definition
was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II |
|
|
Term
|
Definition
Machine used to decipher the Lorenz |
|
|
Term
|
Definition
a word, phrase, or sentence formed from another by rearranging its letters |
|
|
Term
|
Definition
a cipher which incorporates the message (the plaintext) into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text, or more commonly, by adding a short primer key to the front of the message. |
|
|
Term
|
Definition
A unit of information, one hundredth of a ban |
|
|
Term
|
Definition
a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. In other words, the same plaintext value will always result in the same ciphertext value. |
|
|
Term
|
Definition
an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents. |
|
|
Term
|
Definition
a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. |
|
|
Term
|
Definition
the number of positive integers that are relatively prime to (i.e., do not contain any factor in common with) where 1 is counted as being relatively prime to all numbers. |
|
|
Term
|
Definition
a measure of how similar a frequency distribution is to the uniform distribution. |
|
|
Term
Linear Feedback Shift Register |
|
Definition
shift register whose input bit is a linear function of its previous state. The most commonly used linear function of single bits is exclusive-or (XOR) |
|
|
Term
|
Definition
is a method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher. Relies on the occasional coincidental alignment of letter groups in plaintext with the keyword, find groups of same letters of 3 or more and calculate the distance between those groups. |
|
|
Term
|
Definition
a cryptographic hash function containing a string of digits created by a one-way hashing formula that takes an input of arbitrary length and produces a message digest that is 128 bits long. |
|
|
Term
|
Definition
a mode of operation for a block cipher. It has some similarities to the ciphertext feedback mode in that it permits encryption of differing block sizes, but has the key difference that the output of the encryption block function is the feedback (instead of the ciphertext). |
|
|
Term
|
Definition
a way to take data that may or may not be a multiple of the block size for a cipher and extend it out so that it is. |
|
|
Term
|
Definition
states that if n items are put into m containers, with n > m, then at least one container must contain more than one item. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
an encryption program that provides cryptographic privacy and authentication for data communication. |
|
|
Term
|
Definition
combines two or more ciphers processes with the intent that the resulting cipher is more secure than the individual ciphers alone |
|
|
Term
|
Definition
an encryption technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication. |
|
|
Term
|
Definition
gathering information through observations of operations of the underlying cipher that can leak performance characteristics |
|
|
Term
|
Definition
A function that is easy to compute in one direction but difficult to compute in the opposite direction (finding its inverse) without special information. |
|
|
Term
|
Definition
a symmetric key cipher operating on fixed-length groups of bits called blocks |
|
|
Term
|
Definition
An analysis of the frequency that letters occur in a message and a simple but powerful cryptanalysis tool |
|
|
Term
|
Definition
The largest divisible factor of two numbers |
|
|
Term
|
Definition
An encryption method where the mapping of the permutation to the natural ordering of the alphabet denotes the key. |
|
|