Term
|
Definition
Set of mathematical and logic rules used in cryptographic functions |
|
|
Term
|
Definition
Another name for algorithm |
|
|
Term
|
Definition
Science of secret writing that enables an entity to store and transmit data in a form that is available only to the intended individuals |
|
|
Term
|
Definition
Hardware or software implementation of cryptography that contains all the necessary software, protocols, algorithms, and keys |
|
|
Term
|
Definition
Practice of uncovering flaws within cryptosystems |
|
|
Term
|
Definition
The study of both cryptography and cryptanalysis |
|
|
Term
|
Definition
Act of transforming data into an unreadable format |
|
|
Term
|
Definition
Act of transforming data into a readable format |
|
|
Term
|
Definition
Sequence of bits that are used as instructions that govern the acts of cryptographic functions within an algorithm |
|
|
Term
|
Definition
Instance when two different keys generate the same ciphertext from the same plaintext |
|
|
Term
|
Definition
A range of possible values used to construct keys |
|
|
Term
|
Definition
Data in readable format, also referred to as cleartext |
|
|
Term
|
Definition
Encryption method that uses an algorithm that changes out (substitutes) one value for another value |
|
|
Term
|
Definition
Ancient encryption tool that used a type of paper and rod used by Greek military factions |
|
|
Term
|
Definition
Concept that an algorithm should be known and only the keys should be kept secret |
|
|
Term
|
Definition
Encryption method created by Gilbert Vernam that is considered impossible to crack if carried out properly |
|
|
Term
|
Definition
Algorithm used to create values that are used in cryptographic functions to add randomness |
|
|
Term
|
Definition
Substitution cipher that creates keystream values, commonly from agreed-upon text passages, to be used for encryption purposes |
|
|
Term
|
Definition
Encryption method that hides a secret message within an open message |
|
|
Term
|
Definition
Method of hiding data in another media type with the goal of secrecy |
|
|
Term
Digital Rights Management (DRM) |
|
Definition
Access control technologies commonly used to protect copyright material |
|
|
Term
|
Definition
Encryption method that shifts (permutation) values |
|
|
Term
|
Definition
Simple substitution algorithm created by Julius Caesar that shifts alphabetic values three positions during its encryption and decryption processes |
|
|
Term
|
Definition
Cryptanalysis process used to identify weaknesses within cryptosystems by locating patterns in resulting ciphertext |
|
|
Term
Key Derivation Functions (KDFs) |
|
Definition
Generation of secret keys (subkeys) from an initial value (master key) |
|
|
Term
|
Definition
Encryption method where the sender and receiver use an instance of the same key for encryption and decryption purposes. |
|
|
Term
|
Definition
Sending data through an alternate communication channel. |
|
|
Term
|
Definition
Encryption method that uses two different key types, public and private. Also called public key cryptography. |
|
|
Term
|
Definition
Value used in public key cryptography that is used for encryption and signature validation that can be known by all parties. |
|
|
Term
|
Definition
Value used in public key cryptography that is used for decryption and signature creation and known to only key owner. |
|
|
Term
|
Definition
Asymmetric cryptography, which uses public and private key values for cryptographic functions. |
|
|
Term
|
Definition
Symmetric algorithm type that encrypts chunks (blocks) of data at a time. |
|
|
Term
|
Definition
Transposition processes used in encryption functions to increase randomness. |
|
|
Term
|
Definition
Substitution processes used in encryption functions to increase randomness. |
|
|
Term
|
Definition
Algorithm design requirement so that slight changes to the input result in drastic changes to the output. |
|
|
Term
|
Definition
Algorithm type that generates a keystream (random values), which is XORd with plaintext for encryption purposes. |
|
|
Term
|
Definition
Component of a stream algorithm that creates random values for encryption purposes. |
|
|
Term
Initialization vectors (IVs) |
|
Definition
Values that are used with algorithms to increase randomness for cryptographic functions.
For example, if we have the plaintext value of “See Spot run” two times within our message, we need to make sure that even though there is a pattern in the plaintext message, a pattern in the resulting ciphertext will not be created. So the IV and key are both used by the algorithm to provide more randomness to the encryption process. |
|
|
Term
|
Definition
Combined use of symmetric and asymmetric algorithms where the symmetric key encrypts data and an asymmetric key encrypts the symmetric key. |
|
|
Term
|
Definition
Symmetric keys that have a short lifespan, thus providing more protection than static keys with longer lifespans. |
|
|
Term
|
Definition
Message is encrypted with a symmetric key and the symmetric key is encrypted with an asymmetric key. Collectively this is called a digital envelope. |
|
|
Term
|
Definition
Block symmetric algorithm chosen by NIST as an encryption standard in 1976. It uses a 56-bit true key bit size, 64-bit block size, and 16 rounds of computation. |
|
|
Term
|
Definition
Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm. |
|
|
Term
Data Encryption Algorithm |
|
Definition
Algorithm chosen to fulfill the Data Encryption Standard. Block symmetric cipher that uses a 56-bit true key size, 64-bit block size, and 16 rounds of computation. |
|
|
Term
Advanced Encryption Standard |
|
Definition
U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256). |
|
|
Term
|
Definition
Block symmetric cipher that was chosen to fulfill the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256). |
|
|
Term
|
Definition
Symmetric cipher that applies DES three times to each block of data during the encryption process. |
|
|
Term
International Data Encryption Algorithm |
|
Definition
Block symmetric cipher that uses a 128-bit key and 64-bit block size. |
|
|
Term
|
Definition
Block symmetric cipher that uses 64-bit block sizes and variable-length keys. |
|
|
Term
|
Definition
Stream symmetric cipher that was created by Ron Rivest of RSA. Used in SSL and WEP. |
|
|
Term
|
Definition
Block symmetric cipher that uses variable block sizes (32, 64, 128) and variable-length key sizes (0–2040). |
|
|
Term
|
Definition
Block symmetric cipher that uses a 128-bit block size and variablelength key sizes (128, 192, 256). Built upon the RC5 algorithm. |
|
|
Term
|
Definition
First asymmetric algorithm created and is used to exchange symmetric key values. Based upon logarithms in finite fields. |
|
|
Term
|
Definition
De facto asymmetric algorithm used for encryption, digital signatures, and key exchange. Based upon the difficulty of factoring large numbers into their original prime numbers. |
|
|
Term
|
Definition
Asymmetric algorithm based upon the Diffie- Hellman algorithm used for digital signatures, encryption, and key exchange. |
|
|
Term
Elliptic curve cryptosystem algorithm |
|
Definition
Asymmetric algorithm based upon the algebraic structure of elliptic curves over finite fields. Used for digital signatures, encryption, and key exchange. |
|
|
Term
|
Definition
Asymmetric algorithm based upon a subset sum problem (knapsack problem). It has been broken and no longer used. |
|
|
Term
|
Definition
One entity can prove something to be true without providing a secret value. |
|
|
Term
|
Definition
Cryptographic process that takes an arbitrary amount of data and generates a fixed-length value. Used for integrity protection. |
|
|
Term
Message authentication code (MAC) |
|
Definition
Keyed cryptographic hash function used for data integrity and data origin authentication. |
|
|
Term
Hashed message authentication code (HMAC) |
|
Definition
Cryptographic hash function that uses a symmetric key value and is used for data integrity and data origin authentication. |
|
|
Term
|
Definition
Cipher block chaining message authentication code uses encryption for data integrity and data origin authentication. |
|
|
Term
|
Definition
Cipher message authentication code that is based upon and provides more security compared to CBC-MAC. |
|
|
Term
|
Definition
Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes. |
|
|
Term
|
Definition
When two different messages are computed by the same hashing algorithm and the same message digest value results. |
|
|
Term
|
Definition
Cryptographic attack that exploits the mathematics behind the birthday problem in the probability theory forces collisions within hashing functions. |
|
|
Term
|
Definition
Ensuring the authenticity and integrity of a message through the use of hashing algorithms and asymmetric algorithms. The message digest is encrypted with the sender’s private key. |
|
|
Term
Digital signature standard |
|
Definition
U.S. standard that outlines the approved algorithms to be used for digital signatures for government authentication activities. |
|
|
Term
|
Definition
Component of a PKI that creates and maintains digital certificates throughout their life cycles. |
|
|
Term
|
Definition
Component of PKI that validates the identity of an entity requesting a digital certificate. |
|
|
Term
Certificate revocation list |
|
Definition
List that is maintained by the certificate authority of a PKI that contains information on all of the digital certificates that have been revoked. |
|
|
Term
Online certificate status protocol |
|
Definition
Automated method of maintaining revoked certificates within a PKI. |
|
|
Term
|
Definition
Digital identity used within a PKI. Generated and maintained by a certificate authority and used for authentication. |
|
|
Term
|
Definition
Technology that encrypts full packets (all headers and data payload) and is carried out without the sender’s interaction. |
|
|
Term
|
Definition
Encryption method used by the sender of data that encrypts individual messages and not full packets. |
|
|
Term
Multipurpose Internet Mail Extension |
|
Definition
Standard that outlines the format of e-mail messages and allows binary attachments to be transmitted through e-mail. |
|
|
Term
|
Definition
Secure/Multipurpose Internet Mail Extensions, which outlines how public key cryptography can be used to secure MIME data types. |
|
|
Term
|
Definition
Cryptosystem used to integrate public key cryptography with e-mail functionality and data encryption, which was developed by Phil Zimmerman. |
|
|
Term
|
Definition
Use of quantum mechanical functions to provide strong cryptographic key exchange. |
|
|
Term
|
Definition
A combination of HTTP and SSL\TLS that is commonly used for secure Internet connections and e-commerce transactions. |
|
|
Term
Secure Electronic Transaction |
|
Definition
Secure e-commerce standard developed by Visa and MasterCard that has not been accepted within the marketplace. |
|
|
Term
|
Definition
Data files used by web browsers and servers to keep browser state information and browsing preferences. |
|
|
Term
|
Definition
Network protocol that allows for a secure connection to a remote system. Developed to replace Telnet and other insecure remote shell methods. |
|
|
Term
|
Definition
Protocol suite used to protect IP traffic through encryption and authentication. De facto standard VPN protocol. |
|
|
Term
Authentication header protocol |
|
Definition
Protocol within the IPSec suite used for integrity and authentication. |
|
|
Term
Encapsulating security protocol |
|
Definition
Protocol within the IPSec suite used for integrity, authentication, and encryption. |
|
|
Term
|
Definition
Mode that IPSec protocols can work in that provides protection for packet data payload. |
|
|
Term
|
Definition
Mode that IPSec protocols can work in that provides protection for packet headers and data payload. |
|
|
Term
Internet Security Association and Key Management Protocol |
|
Definition
Used to establish security associates and an authentication framework in Internet connections. Commonly used by IKE for key exchange. |
|
|
Term
|
Definition
Attack where the attacker does not interact with processing or communication activities, but only carries out observation and data collection, as in network sniffing. |
|
|
Term
|
Definition
Attack where the attacker does interact with processing or communication activities. |
|
|
Term
|
Definition
Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts. |
|
|
Term
|
Definition
Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and ciphertext. |
|
|
Term
|
Definition
Cryptanalysis attack where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts. |
|
|
Term
|
Definition
Cryptanalysis attack where the attacker chooses a ciphertext and obtains its decryption under an unknown key. |
|
|
Term
Differential cryptanalysis |
|
Definition
Cryptanalysis method that uses the study of how differences in an input can affect the resultant difference at the output. |
|
|
Term
|
Definition
Cryptanalysis method that uses the study of affine transformation approximation in encryption processes. |
|
|
Term
|
Definition
Attack that uses information (timing, power consumption) that has been gathered to uncover sensitive data or processing functions. |
|
|
Term
|
Definition
Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized access. |
|
|
Term
|
Definition
Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions. |
|
|
Term
|
Definition
Cryptanalysis attack that exploits vulnerabilities within the algorithm structure. |
|
|
Term
|
Definition
Cryptanalysis attack that uses identified statistical patterns. |
|
|
Term
Social engineering attack |
|
Definition
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques. |
|
|
Term
Meet-in-the-middle attack |
|
Definition
Cryptanalysis attack that tries to uncover a mathematical problem from two different ends. |
|
|