Term
|
Definition
The practice and study of hiding information. |
|
|
Term
|
Definition
The process of changing information using an algorithm (or cipher) into another form that is unreadable by others—unless they possess the key to that data. |
|
|
Term
|
Definition
An algorithm that can perform encryption or decryption. |
|
|
Term
|
Definition
Well-defined instructions that describe computations from their initial state to their final state. |
|
|
Term
|
Definition
The essential piece of information that determines the output of a cipher. |
|
|
Term
|
Definition
A class of cipher that uses identical or closely related keys for encryption and decryption. |
|
|
Term
|
Definition
A type of algorithm that encrypts each byte in a message on at a time. |
|
|
Term
|
Definition
A type of algorithm that encrypts a number of bits as individual units known as blocks. |
|
|
Term
|
Definition
This type of cipher uses a pair of different keys to encrypt and decrypt data. |
|
|
Term
|
Definition
Uses asymmetric keys alone or in addition to symmetric keys. The asymmetric key algorithm creates a secret private key and a published public key. |
|
|
Term
|
Definition
A type of key that is known only to a specific user or users who keep the key a secret. |
|
|
Term
|
Definition
A type of key that is known to all parties involved in encrypted transactions within a given group. |
|
|
Term
|
Definition
A signature that authenticates a document through math, letting the recipient know that the document was created and sent by the actual sender and not someone else. |
|
|
Term
|
Definition
Digitally signed electronic documents that bind a public key with a user identity. |
|
|
Term
|
Definition
The science (and art) of writing hidden messages; it is a form of security through obscurity. |
|
|
Term
|
Definition
Data Encryption Standard
The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data. |
|
|
Term
|
Definition
Triple Data Encryption Standard
Similar to DES but applies the cipher algorithm three times to each cipher block. |
|
|
Term
|
Definition
Advanced Encryption Standard
An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256. |
|
|
Term
|
Definition
A public key cryptography algorithm created by Rivest, Shamir, Adleman. It is commonly used in e-commerce. |
|
|
Term
Diffie-Hellman Key Exchange |
|
Definition
Invented in the 1970s, it was the first practical method for establishing a shared secret key over an unprotected communications channel. |
|
|
Term
|
Definition
Elliptic Curve Cryptography
A type of public key cryptography based on the structure of an elliptic curve. |
|
|
Term
|
Definition
A cipher that encrypts plaintext with a secret random key that is the same length as the plaintext. |
|
|
Term
|
Definition
Pretty Good Privacy
An encryption program used primarily for signing, encrypting, and decrypting e-mails in an attempt to increase the security of e-mail communications. |
|
|
Term
|
Definition
A summary of a file or message. It is generated to verify the integrity of the file or message. |
|
|
Term
|
Definition
A mathematical procedure that converts a variable-sized amount of data into a smaller block of data. |
|
|
Term
Cryptographic Hash Functions |
|
Definition
Hash functions based on block ciphers. |
|
|
Term
|
Definition
Message-Digest Algorithm 5
A 128-bit key hash used to provide integrity of files and messages. |
|
|
Term
|
Definition
Secure Hash Algorithm
A group of hash functions designed by the NSA and published by the NIST, widely used in government. The most common currently is SHA-1. |
|
|
Term
|
Definition
An attack on a hashing system that attempts to send two different messages with the same hash function, causing a collision. |
|
|
Term
|
Definition
The original hash used to store Windows passwords, known as LM hash, based off the DES algorithm. |
|
|
Term
|
Definition
Successor to the LM hash. A more advanced hash used to store Windows passwords, based off the RC4 algorithm. |
|
|
Term
|
Definition
Successor to the NTLM hash. Based off the MD5 hashing algorithm. |
|
|