| Term 
 | Definition 
 
        | different encryption keys generate the same ciphertext from the same plaintext message. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | encryption or decryption request is performed immediately. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Encrypt/Decrypt requests are processed in queues. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | a one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Variable data input (of any size) + hashing algorithm = fixed bit stream output (hash value) 
 * MD5 = 128 bits
 * SHA1 = 160 bits.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | provide authentication of a sender and integrity of a sender's message. A message is input into a hash function. Then the hash value is encrypted using the private key of the sender. the result of these two steps yields a digital signature. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | a single key used to encrypt and to decrypt. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | two different but mathematically related keys are used where one key is used to decrypt |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | used to identify the certificate holder when conducting electronic transactions - type of certificates currently used = x.509 v3 |  | 
        |  | 
        
        | Term 
 
        | Certificate authority (CA): |  | Definition 
 
        | an entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | only issues certificates to Subordinate CA's |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | issues certificates to users + computers on behalf of the Root CA |  | 
        |  | 
        
        | Term 
 
        | Registration authority (RA): |  | Definition 
 
        | responsible for the accuracy of the information contained in a certificate request. The RA is also expected to perform user validation before issuing a certificate request |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | This represents the entire cryptographic operation. This includes the algorithm, key, and key management functions |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The input that controls the operation of the cryptographic algorithm |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | study of techniques for attempting to defeat cryptographic techniques and information security services |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | the science that deals with hidden, disguised, or encrypted communications |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | occurs when a hash function generates the same output for different inputs |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | the time and effort required to break a protective measure |  | 
        |  |