Term
|
Definition
| System functioned by wrapping a strip of papyrus or leather around a rod of fixed diameter on which a message was written |
|
|
Term
|
Definition
| Plain text was rotated by 3 letters (ex: cat was FDW) |
|
|
Term
CH 1
Privacy (Confidentiality) |
|
Definition
| What is private should stay private, whether at rest or in transit |
|
|
Term
|
Definition
| Proof that a message is from the person or entity we believe ti yo be from |
|
|
Term
|
Definition
| Information should remain unaltered |
|
|
Term
|
Definition
| Proof of delivery and recipient is assured of senders identity. |
|
|
Term
Ch1
Truecypt and Bitlocker |
|
Definition
| Offer ability to encrypt HD |
|
|
Term
|
Definition
| Clear text that is readable |
|
|
Term
|
Definition
| Encrypted text atht is unreadable |
|
|
Term
|
Definition
| Transforming data into an unreadable format. For example, using Ceasar's cipher to encrypt the word cat would result in fdw. Encryption here has moved each character forward three letters. |
|
|
Term
|
Definition
| The act of obtaining plain text from cipher text without a cryptographic key. It is used by governments, the military, enterprised, ethical hackers, and malicious hackers to find weaknesses and crack cryptographic systems. |
|
|
Term
|
Definition
| A hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity. |
|
|
Term
Ch1
Symmetric Cryptography |
|
Definition
| This type uses a single private key |
|
|
Term
Ch1
Asymmetric Cryptography |
|
Definition
| This type uses two keys: a public key know to everyone and a private key that only the recipient of messages uses. |
|
|
Term
|
Definition
| mathematical procedure or function that coverts a large amount of data into a fixed samll string of data or integer. The output of a hash is known as a hash value, hash code, hash sum, checksum, fingerprint or message digest. |
|
|
Term
|
Definition
| Function by dividing the message into blocks for processing |
|
|
Term
|
Definition
| Functions by dividing the message into bits for processing. |
|
|
Term
|
Definition
| How strong the encryption process is relies in part on the cryptograpic algorithm functions. It can be used to control the transformation of plain text to cipher text or cipher text to plain text. |
|
|
Term
|
Definition
| Although key size is important, the randomness of the key is also critical. You may have been asked to create a random key before and not realized what you were actually doing. |
|
|