Shared Flashcard Set

Details

Security + Chapter 12
Security + Chapter 12
32
Computer Science
Not Applicable
08/02/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Cryptography
Definition
The practice and study of hiding information.
Term
Encryption
Definition
The process of changing information using an algorithm (or cipher) into another form that is unreadable by others—unless they possess the key to that data.
Term
Cipher
Definition
An algorithm that can perform encryption or decryption.
Term
Algorithms
Definition
Well-defined instructions that describe computations from their initial state to their final state.
Term
Key
Definition
The essential piece of information that determines the output of a cipher.
Term
Symmetric Key Algorithm
Definition
A class of cipher that uses identical or closely related keys for encryption and decryption.
Term
Stream Cipher
Definition
A type of algorithm that encrypts each byte in a message on at a time.
Term
Block Cipher
Definition
A type of algorithm that encrypts a number of bits as individual units known as blocks.
Term
Asymmetric Key Algorithm
Definition
This type of cipher uses a pair of different keys to encrypt and decrypt data.
Term
Public Key Cryptography
Definition
Uses asymmetric keys alone or in addition to symmetric keys. The asymmetric key algorithm creates a secret private key and a published public key.
Term
Private Key
Definition
A type of key that is known only to a specific user or users who keep the key a secret.
Term
Public Key
Definition
A type of key that is known to all parties involved in encrypted transactions within a given group.
Term
Digital Signature
Definition
A signature that authenticates a document through math, letting the recipient know that the document was created and sent by the actual sender and not someone else.
Term
Certificates
Definition
Digitally signed electronic documents that bind a public key with a user identity.
Term
Steganography
Definition
The science (and art) of writing hidden messages; it is a form of security through obscurity.
Term
DES
Definition

Data Encryption Standard

 

The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.

Term
3DES
Definition

Triple Data Encryption Standard

 

Similar to DES but applies the cipher algorithm three times to each cipher block.

Term
AES
Definition

Advanced Encryption Standard

 

An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256.

Term
RSA
Definition
A public key cryptography algorithm created by Rivest, Shamir, Adleman. It is commonly used in e-commerce.
Term
Diffie-Hellman Key Exchange
Definition
Invented in the 1970s, it was the first practical method for establishing a shared secret key over an unprotected communications channel.
Term
ECC
Definition

Elliptic Curve Cryptography

 

A type of public key cryptography based on the structure of an elliptic curve.

Term
One-Time Pad
Definition
A cipher that encrypts plaintext with a secret random key that is the same length as the plaintext.
Term
PGP
Definition

Pretty Good Privacy

 

An encryption program used primarily for signing, encrypting, and decrypting e-mails in an attempt to increase the security of e-mail communications.

Term
Hash
Definition
A summary of a file or message. It is generated to verify the integrity of the file or message.
Term
Hash Function
Definition
A mathematical procedure that converts a variable-sized amount of data into a smaller block of data.
Term
Cryptographic Hash Functions
Definition
Hash functions based on block ciphers.
Term
MD5
Definition

Message-Digest Algorithm 5

 

A 128-bit key hash used to provide integrity of files and messages.

Term
SHA
Definition

Secure Hash Algorithm

 

A group of hash functions designed by the NSA and published by the NIST, widely used in government. The most common currently is SHA-1.

Term
Birthday Attack
Definition
An attack on a hashing system that attempts to send two different messages with the same hash function, causing a collision.
Term
LANMAN Hash
Definition
The original hash used to store Windows passwords, known as LM hash, based off the DES algorithm.
Term
NTLM Hash
Definition
Successor to the LM hash. A more advanced hash used to store Windows passwords, based off the RC4 algorithm.
Term
NTLM2 Hash
Definition
Successor to the NTLM hash. Based off the MD5 hashing algorithm.
Supporting users have an ad free experience!