CH 9 vocab Fundamentals of Information Security V2.0
Decryption
act of unscrambling ciphertext into plaintext
Cipher
algorithm to encrypt or decrypt information
One-way algorithm
an encryption algorithm that has no corresponding decryption algorithm
Key-encrypting key
an encryption key used to encrypt other keys before transmitting them
Key distribution
process of issuing keys to valid users of a cryptosystem so they can communicate
SSL Handshake
process that creates the first secure communications sessions between a client and server
Timestamping
providing an exact time when a producer creates or sends information
Salt Value
random characters that you can combine with an actual input key to create the encryption key
Key
secret value of a cipher uses to encrypt or decrypt information
Security Association (SA)
contains all the information needed to do a variety of network security services
Plaintext
encrypted information
Product cipher
encryption cipher that is a combination of multiple ciphers
Data Encryption Standard (DES)
encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation
Transposition cipher
encryption cipher that rearranges characters or bits of data
Substitution cipher
encryption cipher that replaces bits, characters, or blocks of information with other bits, characters, or blocks
Simple subsititution cipher
encryption cipher that uniquely maps any letter to any other letter
Keyword Mixed alphabet cipher
encryption cipher that uses a cipher alphabet that consists of a keyword
Vigenere Cipher
encryption cipher that uses multiple encryption schemes in succession
Private and Public (symmetric) key
encryption cipher that uses one key to encrypt and another key to decrypt information
Digitized Signature
image of an electronically reproduced signature
Differential Cryptanalysis
looking for patterns in vast amounts of ciphertext
Algorithm
mathematical process or series of structured steps for performing some function
Digital Signature
object that uses asymmetric encryption to bind a message or data to a specific entity
Caesar Cipher
one of the simplest substitution ciphers
One-time pad cipher/ Vernam Cipher
only unbreakable cryptography cipher
Nonrepudiation
prevents a party from denying a previous statement or action
Keyspace
set of all possible encryption keys
Public key infrastructure(PKI)
set of hardware, software, people, policies, procedures needed to create, manage, distribute , use, store, and revoke digital certificates
Key revocation
situation in which someone is no longer trusted or allowed to use a cryptosystem
Revocation
stopping authorization for access to data
Public Key cryptography
system that allows correspondents to communicate only over a public channel using publicity known techniques
Checksum /Hash
the output of a one way algorithm
Certificate Authority (CA)
trusted entity that stores and distributes certified digital certificates
Key directory
trusted repository of all public keys
Symmetric key cryptography
type of cryptography that cannot secure correspondence until after the two parties exchange keys
Asymmetric Key Cryptography
type of cryptography that uses cipher with two separate keys, one for encryption and decryption