Term
|
Definition
The process of converting plaintext into scrambled output called ciphertext. |
|
|
Term
|
Definition
Mathematical method to convert plaintext into ciphertext. |
|
|
Term
|
Definition
Symmetric-key encryption algorithm that encrypts data in fixed-size blocks by breaking the data into chunks for processing. |
|
|
Term
|
Definition
Symmetric-key encryption algorithm that encrypts data bit by bit or byte by byte, providing continuous encryption and decryption of data streams. |
|
|
Term
|
Definition
Encrypted network channels |
|
|
Term
|
Definition
An encryption method using two mathematically aligned keys called a key pair (public/private keys) for encryption and decryption. |
|
|
Term
|
Definition
An encryption method using a single key for encryption and decryption. |
|
|
Term
Shared key or preshared key (including passwords) |
|
Definition
A cryptographic key that is used for both encryption and decryption, and it must be kept confidential between authorized parties to maintain the security of encrypted communications or data. |
|
|
Term
|
Definition
A mathematical formula to perform encryption, decryption and other security-centric operations. |
|
|
Term
|
Definition
Is the secure process of sharing cryptographic keys between parties to enable encrypted communication. |
|
|
Term
|
Definition
The size of the cryptographic key; larger keys are potentially more secure than shorter key lengths, however, longer keys require more processing power. |
|
|
Term
|
Definition
Strengthens the resiliency of a cryptographic key to brute force attacks by applying a hash function or block cipher to the key repeatedly, increasing its length and complexity and making it more resistant to attacks like brute force. |
|
|
Term
|
Definition
Adding a extra piece of data to a password before being run through a hashing algorithm. |
|
|
Term
Trusted Platform Module (TPM) |
|
Definition
Hardware-based security component that stores cryptographic keys, certificates, and sensitive data, and secure storage for credentials and encryption keys. |
|
|
Term
Hardware security module or (HSM) |
|
Definition
A dedicated hardware device or appliance that provides secure key storage, management, and cryptographic operations. |
|
|
Term
|
Definition
A trusted and isolated environment within a system's hardware or software that protects sensitive data and cryptographic operations. |
|
|