CH 9 vocab Fundamentals of Information Security V2.0

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Decryption

act of unscrambling ciphertext into plaintext

Cipher

algorithm to encrypt or decrypt information

One-way algorithm

an encryption algorithm that has no corresponding decryption algorithm

Key-encrypting key

an encryption key used to encrypt other keys before transmitting them

Key distribution

process of issuing keys to valid users of a cryptosystem so they can communicate

SSL Handshake

process that creates the first secure communications sessions between a client and server

Timestamping

providing an exact time when a producer creates or sends information

Salt Value

random characters that you can combine with an actual input key to create the encryption key

Key

secret value of a cipher uses to encrypt or decrypt information

Security Association (SA)

contains all the information needed to do a variety of network security services

Plaintext

encrypted information

Product cipher

encryption cipher that is a combination of multiple ciphers

Data Encryption Standard (DES)

encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation

Transposition cipher

encryption cipher that rearranges characters or bits of data

Substitution cipher

encryption cipher that replaces bits, characters, or blocks of information with other bits, characters, or blocks

Simple subsititution cipher

encryption cipher that uniquely maps any letter to any other letter

Keyword Mixed alphabet cipher

encryption cipher that uses a cipher alphabet that consists of a keyword

Vigenere Cipher

encryption cipher that uses multiple encryption schemes in succession

Private and Public (symmetric) key

encryption cipher that uses one key to encrypt and another key to decrypt information

Digitized Signature

image of an electronically reproduced signature

Differential Cryptanalysis

looking for patterns in vast amounts of ciphertext

Algorithm

mathematical process or series of structured steps for performing some function

Digital Signature

object that uses asymmetric encryption to bind a message or data to a specific entity

Caesar Cipher

one of the simplest substitution ciphers

One-time pad cipher/ Vernam Cipher

only unbreakable cryptography cipher

Nonrepudiation

prevents a party from denying a previous statement or action

Keyspace

set of all possible encryption keys

Public key infrastructure(PKI)

set of hardware, software, people, policies, procedures needed to create, manage, distribute , use, store, and revoke digital certificates

Key revocation

situation in which someone is no longer trusted or allowed to use a cryptosystem

Revocation

stopping authorization for access to data

Public Key cryptography

system that allows correspondents to communicate only over a public channel using publicity known techniques

Checksum /Hash

the output of a one way algorithm

Certificate Authority (CA)

trusted entity that stores and distributes certified digital certificates

Key directory

trusted repository of all public keys

Symmetric key cryptography

type of cryptography that cannot secure correspondence until after the two parties exchange keys

Asymmetric Key Cryptography

type of cryptography that uses cipher with two separate keys, one for encryption and decryption


Ensembles d'études connexes

Chapter 3: Adjusting Accounts for Financial Statements

View Set

WEBSITE MANAGEMENT CUMULATIVE FINAL

View Set

Chapter Two: Adjusting Entries 400

View Set

Networking Unit 5: Network Cabling

View Set

Athletic Training - Chapter Eight

View Set

Exam 2 McGraw Hill Questions 24, 4, 28

View Set

Hiragana "H/F" group はひふへほ(ha, hi, fu, he & ho)

View Set

Research Methods in Psychology Final Exam Study

View Set

P3 Spring - Pharmacy Law - Quiz 1

View Set