Term
|
Definition
| Process of converting an original message into a form unreadable by unauthorized individuals |
|
|
Term
|
Definition
| Obtaining the original message from an encrypted message without knowing the keys |
|
|
Term
|
Definition
|
|
Term
|
Definition
| An encryption method or process encompassing the algorithm and procedures to perfom encryption and decryption |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Information used in conjuncation with an algorithm to create ciphertext from plaintext |
|
|
Term
|
Definition
| The entire range of values that can be used to construct an individual key |
|
|
Term
|
Definition
| A series of encryptions and decryptions among a number of systems |
|
|
Term
|
Definition
| Verification that a message was sent by a particular sender and cannot be refuted |
|
|
Term
|
Definition
| The original unencrypted message, or a message that has been successfully descrypted |
|
|
Term
|
Definition
| The process of replacing plaintext values with other values to form ciphertext |
|
|
Term
|
Definition
| The process of rearraging plaintext values to form ciphertext |
|
|
Term
|
Definition
| The amount of effort required to decode an encrypted message when the key and/or algorithm is unknown |
|
|
Term
|
Definition
| Same secret key used to encipher and decipher the message |
|
|
Term
|
Definition
| Uses two different keys (commonly a public and a private key) |
|
|