Term
|
Definition
| Hash value that has been encrypted with the senders private key. Ensures AUTHENTICITY and INTEGRITY of message. |
|
|
Term
| A message that is encrypted provides what level of security services? |
|
Definition
|
|
Term
| A message that is hased provides what level of security services? |
|
Definition
|
|
Term
| A message that is digitally signed provides what level of security services? |
|
Definition
| Authentication, Nonrepudiation and Integrity |
|
|
Term
| A message that is encrypted and digitally signed provides what level of security services? |
|
Definition
| Confindentiality, Authentication, Nonrepudiation and Integrity |
|
|
Term
| Asymmetric Key Alogorithms |
|
Definition
RSA: Encrypt, Digital Sign & Key Distr ECC: Encrypt, Digital Sign & Key Distr Diffe-Hellman: Key Distro El Gamal: Encrypt, D Sign & Key Distr DSA: Digital Signature Knapsack: Encrypt, D Sign & Key Distr |
|
|
Term
| Symmetric Key Alogorithms |
|
Definition
DES: Encryption 3DES: Encryption Blowfish: Encryption IDEA: Encryption RC4: Encryption SAFER: Encryption |
|
|
Term
|
Definition
MD2: Hashing Functions MD4: Hashing Functions MD5: Hashing Functions SHA Family: Hashing Functions HAVAL: Hashing Functions TIGER: Hashing Functions |
|
|
Term
| Digital Signature Standard - DSS |
|
Definition
| Developed in 1991 by NIST, RSA and DSA are best know and most widley used digital signature algorithms |
|
|
Term
|
Definition
| First asymmetric alogorithm created and is used to exchange key values |
|
|
Term
|
Definition
| De facto asymmetric algorithm used for encryption, digital signatures and key exchange |
|
|
Term
|
Definition
| Aysmmetric algorithm based upon the Diffie-Hellman algorithm used for encryption, digital signatures and key exchange |
|
|
Term
| Ellipic curve cryptosystem alogorithm |
|
Definition
| Asymmetric alogorithm bsed on the algebraic structure of elicpic curves over finite curves. Used for encryption, digital signatures and key exchange |
|
|
Term
|
Definition
| Aysmmetric algorithm based upon a subset sum problem (knapsack problem) It has been broken and is NO LONGER USED |
|
|
Term
|
Definition
| One entity can prove something to be true without providing a secrect value |
|
|
Term
|
Definition
| Cryptogrpahic process that takes an aribtrary amount of data and generates a fixed length value. Used for INTEGRITY protection |
|
|
Term
| Message Authentication Code (MAC) |
|
Definition
| Keyd cryptographic hash function used for data INTEGRITY and data origin AUTHENTICATION. |
|
|
Term
| Hased Message Authentication Code (HMAC) |
|
Definition
| Cryptographic hash function that uses a symmetrick key value and is used for data INTEGRITY and data origin AUTHENTICATION. |
|
|
Term
| CBC-MAC = Cipher Block Chaining |
|
Definition
| Cipher block chaining message authentication code uses encryption for data INTEGRITY and data origin AUTHENTICATION |
|
|
Term
| CMAC - Cipher-Based Message Authentication Code |
|
Definition
| Cipher message authentication code that is based upon and provides more security compared to CBC-MAC. |
|
|
Term
|
Definition
| Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes |
|
|
Term
|
Definition
| When two different messages are computed by the same hashing algorithm and the same message digest value results. |
|
|
Term
| Public Key Infrastructure (PKI) |
|
Definition
Provides: Confidentiality Access Control Integrity Authentication Nonrepudiation |
|
|