Term
|
Definition
Process of converting an original message into a form unreadable by unauthorized individuals |
|
|
Term
|
Definition
Obtaining the original message from an encrypted message without knowing the keys |
|
|
Term
|
Definition
|
|
Term
|
Definition
An encryption method or process encompassing the algorithm and procedures to perfom encryption and decryption |
|
|
Term
|
Definition
|
|
Term
|
Definition
Information used in conjuncation with an algorithm to create ciphertext from plaintext |
|
|
Term
|
Definition
The entire range of values that can be used to construct an individual key |
|
|
Term
|
Definition
A series of encryptions and decryptions among a number of systems |
|
|
Term
|
Definition
Verification that a message was sent by a particular sender and cannot be refuted |
|
|
Term
|
Definition
The original unencrypted message, or a message that has been successfully descrypted |
|
|
Term
|
Definition
The process of replacing plaintext values with other values to form ciphertext |
|
|
Term
|
Definition
The process of rearraging plaintext values to form ciphertext |
|
|
Term
|
Definition
The amount of effort required to decode an encrypted message when the key and/or algorithm is unknown |
|
|
Term
|
Definition
Same secret key used to encipher and decipher the message |
|
|
Term
|
Definition
Uses two different keys (commonly a public and a private key) |
|
|