Encryption & Network Security Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

HSM (Hardware Security Module)

A physical device that manages digital keys and performs encryption/decryption, often used for secure key storage and cryptographic processing.

2
New cards

TPM (Trusted Platform Module)

A hardware chip on the motherboard that provides secure cryptographic key storage and supports device authentication and integrity checks.

3
New cards

SED (Self-Encrypting Drive)

A data storage device with built-in hardware-level encryption that encrypts all data automatically as it’s written to the drive.

4
New cards

FDE (Full Disk Encryption)

Software technology that encrypts the entire contents of a storage device, protecting data at rest.

5
New cards

EFS (Encrypting File System)

A Windows feature that allows users to encrypt individual files or folders, protecting them from unauthorized access.

6
New cards

BitLocker

A Microsoft Windows tool for full disk encryption, protecting entire drives using TPM or a password.

7
New cards

GPG (GNU Privacy Guard)

Open-source encryption software that implements OpenPGP standard to encrypt, sign, and manage keys.

8
New cards

PGP (Pretty Good Privacy)

Encryption software used for securing emails, files, and communications through public-key cryptography.

9
New cards

HTTPS (HyperText Transfer Protocol Secure)

Secure version of HTTP that encrypts web traffic using SSL/TLS.

10
New cards

SFTP (Secure File Transfer Protocol)

A protocol for secure file transfer over SSH (not SSL/TLS) which encrypts both commands and data.

11
New cards

SSH (Secure Shell)

A cryptographic protocol for secure network communication, remote login, and command execution.

12
New cards

ESP (Encapsulating Security Payload)

A part of IPsec that provides authentication, integrity, and confidentiality for IP packets.

13
New cards

VPN (Virtual Private Network)

Creates encrypted 'tunnels' over public networks to connect remote systems securely.

14
New cards

SRTP (Secure Real-time Transport Protocol)

Protocol for secure, real-time delivery of audio and video over IP networks.

15
New cards

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

Encryption protocol used in WPA2 Wi-Fi security, based on AES.

16
New cards

TLS (Transport Layer Security)

Successor to SSL, providing encryption and integrity for communications over networks.

17
New cards

Symmetric Encryption

Uses a single key for both encryption and decryption; fast and suitable for bulk data encryption.

18
New cards

Asymmetric Encryption

Uses a public key to encrypt and a private key to decrypt; used in PKI, digital signatures, and key exchange.

19
New cards

DHE (Diffie-Hellman Ephemeral)

Temporary key exchange protocol providing Perfect Forward Secrecy.

20
New cards

ECC (Elliptic Curve Cryptography)

Uses elliptic curve math for strong encryption with smaller key sizes; ideal for IoT and mobile devices.

21
New cards

RSA

Public-key cryptosystem based on large prime factorization; used for encryption, key exchange, and digital signatures.

22
New cards

KEK (Key Encryption Key)

A key used to encrypt or protect other cryptographic keys within a key management system.

23
New cards

IKE (Internet Key Exchange)

Protocol used in IPsec to securely exchange cryptographic keys and establish secure connections.

24
New cards

PFS (Perfect Forward Secrecy)

A property ensuring that compromise of one session key doesn’t affect past or future sessions.

25
New cards

ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)

A key exchange method using elliptic curves to provide forward secrecy and efficiency.

26
New cards

AES (Advanced Encryption Standard)

Symmetric block cipher widely used for secure data encryption, available in multiple key sizes.

27
New cards

DES (Data Encryption Standard)

Older symmetric-key encryption algorithm, now deprecated and replaced by AES.

28
New cards

3DES (Triple DES)

An improvement on DES that applies encryption three times for increased security.

29
New cards

IDEA (International Data Encryption Algorithm)

Symmetric cipher once used in PGP; largely replaced by AES.

30
New cards

XOR (Exclusive OR)

Logical operation used in many encryption algorithms to combine plaintext with key material.

31
New cards

CBC (Cipher Block Chaining)

Block cipher mode where each ciphertext block depends on the previous block, providing diffusion.

32
New cards

CFB (Cipher Feedback)

Block cipher mode that turns a block cipher into a stream cipher for encrypting smaller units of data.

33
New cards

CTR / CTM (Counter Mode)

Block cipher mode that turns a block cipher into a stream cipher using counters for each block.

34
New cards

GCM (Galois/Counter Mode)

Combines CTR encryption with authentication for both confidentiality and integrity.

35
New cards

ECB (Electronic Codebook)

Simplest and weakest block cipher mode—encrypts each block independently, revealing patterns.

36
New cards

Key Size / Key Length

Number of bits in a key; longer keys mean more possible combinations and stronger security.

37
New cards

Computer Drive

physical component used for long-term storage of digital information, such as the OS, applications, and user files

38
New cards