Cryptography & Encryption
Twofish encryption
block cipher that encrypts data in 128-bit blocks
Triple DES (3DES) encryption
block cipher that uses DES encryption, but the strength of the algorithm uses two or three keys
private key
decrypts data once they are received
Cryptanalyst
discovers weaknesses and vulnerabilities in solutions
substitution cipher
each letter represents a different letter
Ciphertext
encoded message
Cryptogram
encoded message as a whole
block cipher
encrypts chunks or blocks of data in fixed size at one time
stream cipher
encrypts each bit of data at one time
public key
encrypts the data and can be located anywhere; not a secret
hybrid encryption
form of encryption that merges symmetric and asymmetric encryption
Blowfish encryption
free symmetric encryption designed to replace DES cipher
watermark
image or text included in a file often used to prove ownership
microdot
image shrunk to roughly the size of a period
Encryption
is derived from the Greek work kryptos, meaning hidden or secret
pre shared key
key used in symmetric encryption
polyalphabetic substitution cipher
mixes a number of cipher alphabets in the cryptogram so each plain letter text is continuously changed
transposition cipher
one in which the words are rearranged within the text
quantum cryptology
physics is used in place of mathematics
Steganography
practice of hiding a file, text, image, or even a video inside another file
Cryptanalysis
process used to discover vulnerabilities in ciphers
RC4 (Rivest cipher 4) encryption
stream cipher characterized by a variable-sized cipher and a random algorithm based on permutation
cryptology
study of ciphers and ciphertext
Advanced Encryption Standard (AES)
symmetric encryption that requires 128-, 192-, and 256-bit keys
Data Encryption Standard (DES)
symmetric encryption that requires keys to be 56 bits in length
Alan Turing
the father of computer science and broke the German Enigma Code Machine
Cipher
tool used to change normal or plain text into something that is unreadable and then back into readable text
key pair
use of both public and private keys in this transaction
symmetric encryption
uses a single key to encrypt and decrypt data
asymmetric encryption
uses two keys, a public key and a private key, to encrypt and decrypt data
mutual authentication
when both peers agree that the other is who they claim to be
IP Security (IPSEC)
Uses cryptographic functions to provide data integrity and confidentiality for IP traffic