Shared Flashcard Set

Details

Security+ 3ed - Chapter 11 Key Terms
Mark Ciampa's Security+ text 3rd edition - Chapter 11 Key Terms
60
Computer Networking
Undergraduate 1
10/24/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
Advanced Encryption Standard (AES)
Definition
A symmetric cipher that has been approved as a replacement for DES.
Term
Algorithm
Definition
Procedures based on a mathematical formula; used to encrypt the data.
Term
Asymmetric Cryptographic Algorithm
Definition
Encryption that uses two mathematically related keys.
Term
BitLocker
Definition
A Microsoft Windows Vista hardware-enabled data encryption feature.
Term
Block Cipher
Definition
A cipher that manipulates an entire block of plaintext at one time.
Term
Blowfish
Definition
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
Term
Ciphertext
Definition
Data that has been encrypted.
Term
Cleartext
Definition
Unencrypted data.
Term
Collision
Definition
In cryptography, two different sets of data that produce the same bash.
Term
Cryptography
Definition
The science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it.
Term
Data Encryption Standard (DES)
Definition
A symmetric block cipher that encrypts data in 64-bit blocks.
Term
Decryption
Definition
The process of changing ciphertext into plaintext.
Term
Diffie-Hellman
Definition
A cryptographic algorithm that allows two users to share a secret key securely over a public network.
Term
Digest
Definition
The unique signature created by a hashing algorithm.
Term
Digital signature
Definition
An electronic verification of the sender.
Term
Elliptic Curve Cryptography
Definition
An algorithm that uses elliptic curves instead of prime numbers to compute keys.
Term
Encrypting File System (EFS)
Definition
An encryption scheme for Windows operating systems.
Term
Encryption
Definition
The process of changing plaintext into ciphertext.
Term
File System
Definition
A method used by operating systems to store, retrieve, and organize files.
Term
GNU Privacy Guard (GPG)
Definition
Free, open-source software that is commonly used to encrypt and decrypt e-mail messages.
Term
Hash
Definition
The unique signature created by a hashing algorithm.
Term
Hashing
Definition
The process for creating a unique signature for a set of data.
Term
Homoalphabetic Substitution Cipher
Definition
A cipher that maps a single plainrext character to multiple ciphertext characters.
Term
International Data Encryption Algorithm (IDEA)
Definition
A symmetric algorithm that dates back to the early 1990s and is used mainly in Europe.
Term
Key
Definition
A mathematical value entered into the algorithm to produce the ciphertext.
Term
Message Digest (MD)
Definition
A common hash algorithm of several different versions.
Term
Message Digest 2 (MD2)
Definition
A hash algorithm that takes plaintext of any length and cretes a hash that is 128 bits in length after the message is divided into 128 bit sections.
Term
Message Digest 4 (MD4)
Definition
A hash that was developed in 1990 for computers that processed 32 bits at a time.
Term
Message Digest S (MDS)
Definition
A revision of MD4 that is designed to address its weaknesss.
Term
Metadata
Definition
Data that is used to describe the content or stucture of the actual data.
Term
Monoalphabetic substitution cipher
Definition
A cipher that simply substitutes one letter or character for another.
Term
Non-repudiation
Definition
The process of proving that a user performed an action.
Term
One-time Pad (OTP)
Definition
Combining a truly random key with plainrext.
Term
One-way Hash
Definition
The process for creating a unique signature for a set of data.
Term
Pad
Definition
In cryptography a truly random key.
Term
Padding
Definition
Additional data that is added to a bash to make it the correct number of bytes.
Term
Plaintext
Definition
Data input into an encryption algorithm.
Term
Pretty Good Privacy (PGP)
Definition
A commercial product that is commonly used to encrypt e-mail messages.
Term
Private Key
Definition
An asymmetric encryption key that does have to be protected.
Term
Private Key cryptography
Definition
Cryptographic algorithms that use a single key to encrypt and decrypt a message.
Term
Public Key
Definition
An asymmetric encryption key that does not have to be protected.
Term
Public Key cryptography
Definition
Encryption that uses two mathematically related keys.
Term
RC2
Definition
A block cipher chat processes blocks of 64 bits.
Term
RC4
Definition
A stream cipher that will accept keys up to 128 bits in length.
Term
RCS
Definition
A block cipher that can accept different length keys and blocks.
Term
RC6
Definition
A cipher that has three key sizes (128 192, and 256 bit) end performs 20 rounds on each block.
Term
Rivest Cipher CRC)
Definition
A family of cipher algorithms designed by Ron Rivest.
Term
RSA
Definition
An asymmetric algorithm published in 1977 and patented by MIT in 1983.
Term
Secure Hash Algorithm (SHA)
Definition
A secure hash algorithm that creates hash values of longer lengths.
Term
SHA-1
Definition
The first versions of Secure Hash Algorithm.
Term
SHA-2
Definition
A family os Secure Hash Algorithms that his four variations, known at SHA-224, SHA-256, SHA-384, and SHA-512.
Term
Steganography
Definition
Hiding the existence of data within a text, audio, image, or video file.
Term
Stream Cipher
Definition
An algorithm that takes one character and replaces it with one character.
Term
Substitution Cipher
Definition
A cipher that simply substitutes one letter or character for another.
Term
Transposition Ciphera
Definition
A Cipher that rearranges letters without changing them.
Term
Triple Data Encryption Standard (3DES)
Definition
A symmetric cipher that was designed to replace DES.
Term
Trusted Platform Module (TPM)
Definition
A chip an the motherboard of the computer that provides cryptographic services.
Term
Twofish
Definition
A later derivation of the Blowfish algorithln that is considered to be strong.
Term
Whirlpool
Definition
A new cryptographic hash function that has received international recognition and adoption by standards organizations.
Term
Whole Disk Encryption
Definition
Cryptography that can be applied to entire disks.
Supporting users have an ad free experience!