Term
Advanced Encryption Standard (AES) |
|
Definition
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES. |
|
|
Term
|
Definition
Procedures based on a mathematical formula used to encrypt and decrypt the data. |
|
|
Term
asymmetric cryptographic algorithm |
|
Definition
Cryptography that uses two mathematically related keys. |
|
|
Term
|
Definition
A cipher that manipulates an entire block of plaintext at one time. Blowfish A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits. |
|
|
Term
|
Definition
Data that has been encrypted. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The science of transforming information into a secure form so that unauthorized persons cannot access it. |
|
|
Term
Data Encryption Standard (DES) |
|
Definition
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks. |
|
|
Term
|
Definition
The process of changing ciphertext into plaintext. |
|
|
Term
|
Definition
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created. |
|
|
Term
Diffie-Hellman Ephemeral (DHE) |
|
Definition
A Diffie-Hellman key exchange that uses different keys. |
|
|
Term
|
Definition
The unique digital fingerprint created by a one-way hash algorithm. |
|
|
Term
|
Definition
An electronic verification of the sender. |
|
|
Term
elliptic curve cryptography (ECC) |
|
Definition
An algorithm that uses elliptic curves instead of prime numbers to compute keys. |
|
|
Term
|
Definition
A Diffie-Hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation. |
|
|
Term
|
Definition
The process of changing plaintext into ciphertext. |
|
|
Term
|
Definition
A temporary key that is used only once before it is discarded. |
|
|
Term
|
Definition
Free and open-source software that is commonly used to encrypt and decrypt data. |
|
|
Term
Hardware Security Module (HSM) |
|
Definition
A secure cryptographic processor. |
|
|
Term
|
Definition
An algorithm that creates a unique digital fingerprint. |
|
|
Term
Hashed Message Authentication Code (HMAC) |
|
Definition
A hash function that is applied to both the key and the message. |
|
|
Term
|
Definition
Exchanging secure information within normal communication channels. |
|
|
Term
|
Definition
A mathematical value entered into a cryptographic algorithm to produce encrypted data. |
|
|
Term
|
Definition
The process of sending and receiving secure cryptographic keys. |
|
|
Term
|
Definition
A common hash algorithm with several different versions. |
|
|
Term
|
Definition
The current version of MD. |
|
|
Term
|
Definition
The process of proving that a user performed an action. |
|
|
Term
|
Definition
Combining plaintext with a random key to create ciphertext that cannot be broken mathematically. |
|
|
Term
|
Definition
Exchanging secure information outside the normal communication channels. |
|
|
Term
|
Definition
Public key systems that generate random public keys that are different for each session. |
|
|
Term
|
Definition
Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
A commercial product that is commonly used to encrypt files and messages. |
|
|
Term
|
Definition
An asymmetric encryption key that does have to be protected. |
|
|
Term
|
Definition
Cryptographic algorithms that use a single key to encrypt and decrypt a message. |
|
|
Term
|
Definition
An asymmetric encryption key that does not have to be protected. |
|
|
Term
|
Definition
Cryptography that uses two mathematically related keys. |
|
|
Term
|
Definition
A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys. |
|
|
Term
RACE Integrity Primitives Evaluation Message Digest (RIPEMD) |
|
Definition
A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process. |
|
|
Term
|
Definition
An RC stream cipher that will accept keys up to 128 bits in length. |
|
|
Term
|
Definition
The most common asymmetric cryptography algorithm. |
|
|
Term
Secure Hash Algorithm (SHA) |
|
Definition
A secure hash algorithm that creates more secure hash values than Message Digest (MD) algorithms. |
|
|
Term
|
Definition
A cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used. |
|
|
Term
|
Definition
Hiding the existence of data within another type of file. |
|
|
Term
|
Definition
An algorithm that takes one character and replaces it with one character. |
|
|
Term
symmetric cryptographic algorithm |
|
Definition
Encryption that uses a single key to encrypt and decrypt a message. |
|
|
Term
Triple Data Encryption Standard (3DES) |
|
Definition
A symmetric cipher that was designed to replace DES. |
|
|
Term
Trusted Platform Module (TPM) |
|
Definition
A chip on the motherboard of the computer that provides cryptographic services. |
|
|
Term
|
Definition
A derivation of the Blowfish algorithm that is considered to be strong. |
|
|
Term
|
Definition
Cryptography that can be applied to entire disks. |
|
|