Term
| Advanced Encryption Standard (AES) |
|
Definition
| A symmetric cipher that has been approved as a replacement for DES. |
|
|
Term
|
Definition
| Procedures based on a mathematical formula; used to encrypt the data. |
|
|
Term
| Asymmetric Cryptographic Algorithm |
|
Definition
| Encryption that uses two mathematically related keys. |
|
|
Term
|
Definition
| A Microsoft Windows Vista hardware-enabled data encryption feature. |
|
|
Term
|
Definition
| A cipher that manipulates an entire block of plaintext at one time. |
|
|
Term
|
Definition
| A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits. |
|
|
Term
|
Definition
| Data that has been encrypted. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| In cryptography, two different sets of data that produce the same bash. |
|
|
Term
|
Definition
| The science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it. |
|
|
Term
| Data Encryption Standard (DES) |
|
Definition
| A symmetric block cipher that encrypts data in 64-bit blocks. |
|
|
Term
|
Definition
| The process of changing ciphertext into plaintext. |
|
|
Term
|
Definition
| A cryptographic algorithm that allows two users to share a secret key securely over a public network. |
|
|
Term
|
Definition
| The unique signature created by a hashing algorithm. |
|
|
Term
|
Definition
| An electronic verification of the sender. |
|
|
Term
| Elliptic Curve Cryptography |
|
Definition
| An algorithm that uses elliptic curves instead of prime numbers to compute keys. |
|
|
Term
| Encrypting File System (EFS) |
|
Definition
| An encryption scheme for Windows operating systems. |
|
|
Term
|
Definition
| The process of changing plaintext into ciphertext. |
|
|
Term
|
Definition
| A method used by operating systems to store, retrieve, and organize files. |
|
|
Term
|
Definition
| Free, open-source software that is commonly used to encrypt and decrypt e-mail messages. |
|
|
Term
|
Definition
| The unique signature created by a hashing algorithm. |
|
|
Term
|
Definition
| The process for creating a unique signature for a set of data. |
|
|
Term
| Homoalphabetic Substitution Cipher |
|
Definition
| A cipher that maps a single plainrext character to multiple ciphertext characters. |
|
|
Term
| International Data Encryption Algorithm (IDEA) |
|
Definition
| A symmetric algorithm that dates back to the early 1990s and is used mainly in Europe. |
|
|
Term
|
Definition
| A mathematical value entered into the algorithm to produce the ciphertext. |
|
|
Term
|
Definition
| A common hash algorithm of several different versions. |
|
|
Term
|
Definition
| A hash algorithm that takes plaintext of any length and cretes a hash that is 128 bits in length after the message is divided into 128 bit sections. |
|
|
Term
|
Definition
| A hash that was developed in 1990 for computers that processed 32 bits at a time. |
|
|
Term
|
Definition
| A revision of MD4 that is designed to address its weaknesss. |
|
|
Term
|
Definition
| Data that is used to describe the content or stucture of the actual data. |
|
|
Term
| Monoalphabetic substitution cipher |
|
Definition
| A cipher that simply substitutes one letter or character for another. |
|
|
Term
|
Definition
| The process of proving that a user performed an action. |
|
|
Term
|
Definition
| Combining a truly random key with plainrext. |
|
|
Term
|
Definition
| The process for creating a unique signature for a set of data. |
|
|
Term
|
Definition
| In cryptography a truly random key. |
|
|
Term
|
Definition
| Additional data that is added to a bash to make it the correct number of bytes. |
|
|
Term
|
Definition
| Data input into an encryption algorithm. |
|
|
Term
| Pretty Good Privacy (PGP) |
|
Definition
| A commercial product that is commonly used to encrypt e-mail messages. |
|
|
Term
|
Definition
| An asymmetric encryption key that does have to be protected. |
|
|
Term
|
Definition
| Cryptographic algorithms that use a single key to encrypt and decrypt a message. |
|
|
Term
|
Definition
| An asymmetric encryption key that does not have to be protected. |
|
|
Term
|
Definition
| Encryption that uses two mathematically related keys. |
|
|
Term
|
Definition
| A block cipher chat processes blocks of 64 bits. |
|
|
Term
|
Definition
| A stream cipher that will accept keys up to 128 bits in length. |
|
|
Term
|
Definition
| A block cipher that can accept different length keys and blocks. |
|
|
Term
|
Definition
| A cipher that has three key sizes (128 192, and 256 bit) end performs 20 rounds on each block. |
|
|
Term
|
Definition
| A family of cipher algorithms designed by Ron Rivest. |
|
|
Term
|
Definition
| An asymmetric algorithm published in 1977 and patented by MIT in 1983. |
|
|
Term
| Secure Hash Algorithm (SHA) |
|
Definition
| A secure hash algorithm that creates hash values of longer lengths. |
|
|
Term
|
Definition
| The first versions of Secure Hash Algorithm. |
|
|
Term
|
Definition
| A family os Secure Hash Algorithms that his four variations, known at SHA-224, SHA-256, SHA-384, and SHA-512. |
|
|
Term
|
Definition
| Hiding the existence of data within a text, audio, image, or video file. |
|
|
Term
|
Definition
| An algorithm that takes one character and replaces it with one character. |
|
|
Term
|
Definition
| A cipher that simply substitutes one letter or character for another. |
|
|
Term
|
Definition
| A Cipher that rearranges letters without changing them. |
|
|
Term
| Triple Data Encryption Standard (3DES) |
|
Definition
| A symmetric cipher that was designed to replace DES. |
|
|
Term
| Trusted Platform Module (TPM) |
|
Definition
| A chip an the motherboard of the computer that provides cryptographic services. |
|
|
Term
|
Definition
| A later derivation of the Blowfish algorithln that is considered to be strong. |
|
|
Term
|
Definition
| A new cryptographic hash function that has received international recognition and adoption by standards organizations. |
|
|
Term
|
Definition
| Cryptography that can be applied to entire disks. |
|
|