Term

Definition
Hash value that has been encrypted with the senders private key. Ensures AUTHENTICITY and INTEGRITY of message. 


Term
A message that is encrypted provides what level of security services? 

Definition


Term
A message that is hased provides what level of security services? 

Definition


Term
A message that is digitally signed provides what level of security services? 

Definition
Authentication, Nonrepudiation and Integrity 


Term
A message that is encrypted and digitally signed provides what level of security services? 

Definition
Confindentiality, Authentication, Nonrepudiation and Integrity 


Term
Asymmetric Key Alogorithms 

Definition
RSA: Encrypt, Digital Sign & Key Distr ECC: Encrypt, Digital Sign & Key Distr DiffeHellman: Key Distro El Gamal: Encrypt, D Sign & Key Distr DSA: Digital Signature Knapsack: Encrypt, D Sign & Key Distr 


Term
Symmetric Key Alogorithms 

Definition
DES: Encryption 3DES: Encryption Blowfish: Encryption IDEA: Encryption RC4: Encryption SAFER: Encryption 


Term

Definition
MD2: Hashing Functions MD4: Hashing Functions MD5: Hashing Functions SHA Family: Hashing Functions HAVAL: Hashing Functions TIGER: Hashing Functions 


Term
Digital Signature Standard  DSS 

Definition
Developed in 1991 by NIST, RSA and DSA are best know and most widley used digital signature algorithms 


Term

Definition
First asymmetric alogorithm created and is used to exchange key values 


Term

Definition
De facto asymmetric algorithm used for encryption, digital signatures and key exchange 


Term

Definition
Aysmmetric algorithm based upon the DiffieHellman algorithm used for encryption, digital signatures and key exchange 


Term
Ellipic curve cryptosystem alogorithm 

Definition
Asymmetric alogorithm bsed on the algebraic structure of elicpic curves over finite curves. Used for encryption, digital signatures and key exchange 


Term

Definition
Aysmmetric algorithm based upon a subset sum problem (knapsack problem) It has been broken and is NO LONGER USED 


Term

Definition
One entity can prove something to be true without providing a secrect value 


Term

Definition
Cryptogrpahic process that takes an aribtrary amount of data and generates a fixed length value. Used for INTEGRITY protection 


Term
Message Authentication Code (MAC) 

Definition
Keyd cryptographic hash function used for data INTEGRITY and data origin AUTHENTICATION. 


Term
Hased Message Authentication Code (HMAC) 

Definition
Cryptographic hash function that uses a symmetrick key value and is used for data INTEGRITY and data origin AUTHENTICATION. 


Term
CBCMAC = Cipher Block Chaining 

Definition
Cipher block chaining message authentication code uses encryption for data INTEGRITY and data origin AUTHENTICATION 


Term
CMAC  CipherBased Message Authentication Code 

Definition
Cipher message authentication code that is based upon and provides more security compared to CBCMAC. 


Term

Definition
Block cipher mode that combines the CTR encryption mode and CBCMAC. One encryption key is used for both authentication and encryption purposes 


Term

Definition
When two different messages are computed by the same hashing algorithm and the same message digest value results. 


Term
Public Key Infrastructure (PKI) 

Definition
Provides: Confidentiality Access Control Integrity Authentication Nonrepudiation 

