Term
|
Definition
| If the message is captured it cannot be deciphered |
|
|
Term
|
Definition
| Guarantees that the message has not been altered |
|
|
Term
|
Definition
| The message is not a forgery and does actually come from whom it says |
|
|
Term
|
Definition
| Attacker tries every possible key with the decryption algorithm |
|
|
Term
|
Definition
| attacker has the ciphertext of several messages all using the same encryption algorithm |
|
|
Term
|
Definition
| attacker has access to the ciphertext of several messages, but also knows something about the plaintext underlying that ciphertext |
|
|
Term
|
Definition
| attacker chooses which data the encryption device encrypts and observes the ciphertext output |
|
|
Term
|
Definition
| a known plaintext attack in which the attacker knows a portion of hte plaintext and the corresponding ciphertext |
|
|
Term
|
Definition
| attacker can choose ifferent ciphertext to be decrypted and has access to the decrypted plaintext |
|
|
Term
|
Definition
| In a modern cryptographic system, key generation is usually automated and not left ot users |
|
|
Term
|
Definition
| Almost all cryptographic algorithms have some weak keys that should not be used |
|
|
Term
|
Definition
| If a Trojan Horse program were installed on the PC an attacker could then have access to the private keys |
|
|
Term
|
Definition
| Key mgmt procedures should provide a secure key exchange mechanism |
|
|
Term
| Key Revocation and Destruction |
|
Definition
| Notifies all interested parties tha a certain key has been compromised and should no longer be used. Erases old keys in amanner that prevents malicious attackers from recovering them |
|
|
Term
|
Definition
Exchanged between two routers supporting a VPN The key to encrypt and decrypt are the same |
|
|
Term
|
Definition
The key to encrypts and decrypt are different, but related Used in secure HTTPS applications |
|
|
Term
|
Definition
| Widely used for code signing |
|
|
Term
|
Definition
| Used in symmetric and assymmetric key generation, digital signatures and other types of applications |
|
|
Term
|
Definition
|
|
Term
| Types of symmetrical encryption |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| I want you to be sure the information came only from me |
|
|
Term
|
Definition
| I want to be sure that you are the only person who can read the file |
|
|
Term
|
Definition
| I cannot deny the file came from me |
|
|