Cryptography; Chapter 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Digital Signatures

Encrypted message components that can be mathematically proven as authentic.

Encapsulating security payload (ESP) protocol

In IPSec, a protocol that provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

Application header (AH) protocol

In IPSec, a protocol that provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.

Certificate revocation list (CRL)

In PKI, a published list of revoked or terminated digital certificates.

Certificate Authority (CA)

In PKI, a third party that manages users' digital certificates.

Registration Authority (RA)

In PKI, a third party that operates under the trusted collaboration of the certificate authority and handles day-to-day certification functions.

Session keys

Limited-use symmetric keys for temporary communications during an online session.

Hash functions

Mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.

Hash algorithms

Public functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.

Digital certificates

Public-key container files that allow PKI system components and end users to validate a public key and identify its owner.

Hash Value

See Message digest

Public encryption

See asymmetric encryption.

Permutation cipher

See transposition cipher.

Digital Signature Standard (DSS)

The NIST standard for digital signature algorithm usage by federal information systems. DSS is based on a variant of the EIGamal signature scheme.

Advanced encryption standard (AES)

The current federal standard for the encryption of data, as specified by NIST. AES is based on the Rijndael algorithm, which was developed by Vincent Rijmen and John Daemen.

Nonrepudiation

The process of reversing public-key encryption to verify that a message was sent by the sender and thus can not be refuted.

Steganography

A data hiding method that involves embedding information within other files, such as digital pictures or other images.

Exclusive OR operation (XOR)

A function within Boolean algebra used as an encryption function in which two bits are compared. If the two bits are identical, the result is a binary 0; otherwise the result is a binary 1.

Diffie-Hellman key exchange

A hybrid cryptosystem that facilitates exchanging private keys using public-key encryption.

Secret key

A key that can be used in symmetric encryption both to encipher and decipher the message.

Message Authentication Code (MAC)

A key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.

Secure Electronic Transaction (SET)

A protocol developed by credit card companies to protect against electronic payment fraud.

Secure Sockets Layer (SSL)

A security protocol developed by Netscape to use public-key encryption to secure a channel over the internet.

Secure Multipurpose Internet Mail Extensions (S/MIME)

A security protocol that builds on the encoding format of the Multipurpose Internet Mail Extensions (MIME) protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.

Secure Hash Standard (SHS)

A standard issued by the National Institute of Standards and Technology (NIST) that specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file.

Privacy-Enhanced Mail (PEM)

A standard proposed by the Internet Engineering Task Force (IETF) that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.

Polyalphabetic substitution

A substitution cipher that incorporates two or more alphabets in the encryption process.

Monoalphabetic substitution

A substitution cipher that only incorporates a single alphabet in the encryption process.

Message digest

A value representing the application of a hash algorithm on a message that is transmitted with the message so it can be compared with the recipient's locally calculated has of the same message. If both hashes are identical after transmission, the message has arrived without modification. Also known as a hash value.

Transposition cipher

Also known as Permutation cipher, an encryption method that involves simply rearranging the values within a block based on an established pattern to create the ciphertext.

Transport mode

An IPSec mode in which only the IP data is encrypted, not the IP headers.

Tunnel mode

An IPSec mode in which the entire IP packet is encrypted and then placed into the content portion of another IP packet.

Vigenere cipher

An advanced type of substitution cipher that uses a simple polyalphabetic code.

Substitution cipher

An encryption method in which one value is substituted for another.

Asymmetric encryption

An encryption method that incorporates mathematical operations involving both public key and private key to encipher or decipher a message. Either key can be used to encrypt a message, but then the other key is required to decrypt it.

Private-key encryption or symmetric encryption

An encryption method that incorporates mathematical operations involving the same secret key both to encipher and decipher the message.

Vernam cipher

An encryption process that generates a random substitution matrix between letters and numbers that is used only one time. Also called a one-time pad.

Secure HTTP (S-HTTP)

An extended version of Hypertext Transfer Protocol that provides for the encryption of protected Web pages transmitted via the Internet between a client and a server.

Public Key Infrastructure (PKI)

An integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely through the use of digital certificates.

Internet Protocol Security (IPSec)

An open-source protocol framework for security development within the TCP/IP family of protocol standards.


Conjuntos de estudio relacionados

Bio 106 Test 1- Lab Exit Questions

View Set

Chapter 1: An Introduction to Biology QUESTIONS

View Set

BNS (VNSG 1323) CH. 18 "Comfort, Rest and Sleep" NCLEX-STYLE QUESTIONS

View Set

Infection prevention and control (ch. 28)

View Set

Topic Test Test Review Complete 100%

View Set