Term
|
Definition
scramble information science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it. |
|
|
Term
|
Definition
hides the existence of the data what appears to be a harmless image can contain hidden data, usually some type of message, embedded within the image. takes the data, divides it into smaller sections and hides it in unused portions of the file |
|
|
Term
|
Definition
data that is used to describe the content or structure of the actual data |
|
|
Term
|
Definition
|
|
Term
|
Definition
Changing original text into a secret message using cryptography |
|
|
Term
|
Definition
Changing secret message back to original form |
|
|
Term
|
Definition
Data stored or transmitted without encryption |
|
|
Term
|
Definition
Data to be encrypted Input into an encryption algorithm data input into an encryption algorithm |
|
|
Term
|
Definition
Has no formatting such as bolding or underline. |
|
|
Term
|
Definition
Mathematical value entered into the algorithm to produce ciphertext (scrambled text) Reverse process uses the key to decrypt the message |
|
|
Term
|
Definition
data that has been encrypted |
|
|
Term
5 basic functions of cryptology |
|
Definition
confidentiality integrity availability authenticity nonredudiation |
|
|
Term
|
Definition
process of proving that a user performed an action, such as sending an email message or a specific document |
|
|
Term
|
Definition
Insures information is correct and unaltered |
|
|
Term
|
Definition
Most basic type of cryptographic algorithm |
|
|
Term
|
Definition
Takes plaintext of any length and creates 128 bit hash Padding added to make short messages 128 bits Considered too slow today and rarely used |
|
|
Term
|
Definition
Message length padded to 512 bits |
|
|
Term
|
Definition
Adopted by standards organizations recent cryptographic has function |
|
|
Term
Understanding symmetric algorithms |
|
Definition
Same shared single key used to encrypt and decrypt document designed to encrypt and decrypt the ciphertext, key must be kept confidential |
|
|
Term
|
Definition
Takes a character and replaces it with a character Simplest type: substitution cipher |
|
|
Term
|
Definition
Rearranges letters without changing them |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
Widely used asymmetric cryptography system Used for files and e-mails on Windows systems |
|
|
Term
|
Definition
Runs on Windows, UNIX, and Linux open source |
|
|
Term
Microsoft Windows Encrypting File System (EFS) |
|
Definition
Cryptography system for Windows Uses NTFS file system Tightly integrated with the file system Encryption and decryption transparent to the user Users can set encryption attribute for a file in the Advanced Attributes dialog box |
|
|
Term
DES data encryption standard |
|
Definition
first widely popular symmetric cryptography algorithms |
|
|