| Term 
 | Definition 
 
        | The process of converting plaintext into scrambled output called ciphertext. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Mathematical method to convert plaintext into ciphertext. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Symmetric-key encryption algorithm that encrypts data in fixed-size blocks by breaking the data into chunks for processing. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Symmetric-key encryption algorithm that encrypts data bit by bit or byte by byte, providing continuous encryption and decryption of data streams. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Encrypted network channels |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An encryption method using two mathematically aligned keys called a key pair (public/private keys) for encryption and decryption. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An encryption method using a single key for encryption and decryption. |  | 
        |  | 
        
        | Term 
 
        | Shared key or preshared key (including passwords) |  | Definition 
 
        | A cryptographic key that is used for both encryption and decryption, and it must be kept confidential between authorized parties to maintain the security of encrypted communications or data. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A mathematical formula to perform encryption, decryption and other security-centric operations. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Is the secure process of sharing cryptographic keys between parties to enable encrypted communication. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The size of the cryptographic key; larger keys are potentially more secure than shorter key lengths, however, longer keys require more processing power. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Strengthens the resiliency of a cryptographic key to brute force attacks by applying a hash function or block cipher to the key repeatedly, increasing its length and complexity and making it more resistant to attacks like brute force. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Adding a extra piece of data to a password before being run through a hashing algorithm. |  | 
        |  | 
        
        | Term 
 
        | Trusted Platform Module (TPM) |  | Definition 
 
        | Hardware-based security component that stores cryptographic keys, certificates, and sensitive data, and secure storage for credentials and encryption keys. |  | 
        |  | 
        
        | Term 
 
        | Hardware security module or (HSM) |  | Definition 
 
        | A dedicated hardware device or appliance that provides secure key storage, management, and cryptographic operations. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A trusted and isolated environment within a system's hardware or software that protects sensitive data and cryptographic operations. |  | 
        |  |