Term
|
Definition
| The practice and study of hiding information. |
|
|
Term
|
Definition
| The process of changing information using an algorithm (or cipher) into another form that is unreadable by others—unless they possess the key to that data. |
|
|
Term
|
Definition
| An algorithm that can perform encryption or decryption. |
|
|
Term
|
Definition
| Well-defined instructions that describe computations from their initial state to their final state. |
|
|
Term
|
Definition
| The essential piece of information that determines the output of a cipher. |
|
|
Term
|
Definition
| A class of cipher that uses identical or closely related keys for encryption and decryption. |
|
|
Term
|
Definition
| A type of algorithm that encrypts each byte in a message on at a time. |
|
|
Term
|
Definition
| A type of algorithm that encrypts a number of bits as individual units known as blocks. |
|
|
Term
|
Definition
| This type of cipher uses a pair of different keys to encrypt and decrypt data. |
|
|
Term
|
Definition
| Uses asymmetric keys alone or in addition to symmetric keys. The asymmetric key algorithm creates a secret private key and a published public key. |
|
|
Term
|
Definition
| A type of key that is known only to a specific user or users who keep the key a secret. |
|
|
Term
|
Definition
| A type of key that is known to all parties involved in encrypted transactions within a given group. |
|
|
Term
|
Definition
| A signature that authenticates a document through math, letting the recipient know that the document was created and sent by the actual sender and not someone else. |
|
|
Term
|
Definition
| Digitally signed electronic documents that bind a public key with a user identity. |
|
|
Term
|
Definition
| The science (and art) of writing hidden messages; it is a form of security through obscurity. |
|
|
Term
|
Definition
Data Encryption Standard
The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data. |
|
|
Term
|
Definition
Triple Data Encryption Standard
Similar to DES but applies the cipher algorithm three times to each cipher block. |
|
|
Term
|
Definition
Advanced Encryption Standard
An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256. |
|
|
Term
|
Definition
| A public key cryptography algorithm created by Rivest, Shamir, Adleman. It is commonly used in e-commerce. |
|
|
Term
| Diffie-Hellman Key Exchange |
|
Definition
| Invented in the 1970s, it was the first practical method for establishing a shared secret key over an unprotected communications channel. |
|
|
Term
|
Definition
Elliptic Curve Cryptography
A type of public key cryptography based on the structure of an elliptic curve. |
|
|
Term
|
Definition
| A cipher that encrypts plaintext with a secret random key that is the same length as the plaintext. |
|
|
Term
|
Definition
Pretty Good Privacy
An encryption program used primarily for signing, encrypting, and decrypting e-mails in an attempt to increase the security of e-mail communications. |
|
|
Term
|
Definition
| A summary of a file or message. It is generated to verify the integrity of the file or message. |
|
|
Term
|
Definition
| A mathematical procedure that converts a variable-sized amount of data into a smaller block of data. |
|
|
Term
| Cryptographic Hash Functions |
|
Definition
| Hash functions based on block ciphers. |
|
|
Term
|
Definition
Message-Digest Algorithm 5
A 128-bit key hash used to provide integrity of files and messages. |
|
|
Term
|
Definition
Secure Hash Algorithm
A group of hash functions designed by the NSA and published by the NIST, widely used in government. The most common currently is SHA-1. |
|
|
Term
|
Definition
| An attack on a hashing system that attempts to send two different messages with the same hash function, causing a collision. |
|
|
Term
|
Definition
| The original hash used to store Windows passwords, known as LM hash, based off the DES algorithm. |
|
|
Term
|
Definition
| Successor to the LM hash. A more advanced hash used to store Windows passwords, based off the RC4 algorithm. |
|
|
Term
|
Definition
| Successor to the NTLM hash. Based off the MD5 hashing algorithm. |
|
|