Chapter 8

Ace your homework & exams now with Quizwiz!

Brute force

Attempts to gain unauthorized access to secure communications have used this

Encryption

Converting original message into a form unreadable by unauthorized individuals

Digital Certificates

Electronic document containing key values and identifying information about entity that controls key

PKI

Integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services enabling users to communicate securely

Hash function

Mathematical algorithms that generate massage summary/digest to confirm message identity and confirm no content has changed

Asymmetric Encryption

Public key encryption, two different keys but related

Cryptology

Science of encryption; combines cryptography and cryptanalysis

Symmetric Encryption

Uses same "secret key" to encipher and decipher message

Dictionary Attack

attackers encrypts every word in a dictionary using same cryptosystem used by target

Digital Signatures

created in response to rising need to verify information transferred using electronic systems

Man in the middle attack

designed to intercept transmission of public key or insert known key structure in place of requested public key

Cryptography

process of making and using codes to secure transmission of information

Decryption

the process of converting the ciphertext message back into plaintext


Related study sets

CompTIA A+ 2019 Core 1 (220-1001) Practice Tests

View Set

Sports medicine and Athletic Training CHAPTER 11: ASSESSMENT AND EVALUATION OF SPORTS INJURIES AND CHAPTER 12

View Set

Quiz 3: Plant and Fungus-like Protists

View Set

Chapter 13: Viruses, Viroids, and Prions

View Set

IT 302 - Test2 [Unit 5 Quiz, Unit 6 Quiz, Unit 7 Quiz]

View Set