3. Cryptography and Encryption

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

43 Terms

1
New cards

AES

Advanced Encryption Standard: Symmetric encryption algorithm widely used globally

2
New cards

AES-256

Advanced Encryption Standards 256-bit: AES implementation using 256-bit key length

3
New cards

CBC

Cipher Block Chaining: Mode of operation for block ciphers

4
New cards

CFB

Cipher Feedback: Mode of operation for block ciphers

5
New cards

CTM

Counter Mode: Mode of operation for block ciphers

6
New cards

DES

Digital Encryption Standard: Older encryption algorithm now considered insecure

7
New cards

DHE

Diffie-Hellman Ephemeral: Key exchange protocol providing forward secrecy

8
New cards

ECC

Elliptic Curve Cryptography: Public-key cryptography based on elliptic curve theory

9
New cards

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral: Key exchange mechanism providing forward secrecy

10
New cards

ECDSA

Elliptic Curve Digital Signature Algorithm: Digital signature algorithm using elliptic curves

11
New cards

EFS

Encrypted File System: Microsoft Windows feature for file encryption

12
New cards

ESP

Encapsulated Security Payload: Part of IPsec protocol suite providing encryption

13
New cards

FDE

Full Disk Encryption: Encryption of entire contents of a storage device

14
New cards

GCM

Galois Counter Mode: Mode of operation for symmetric key cryptographic block ciphers

15
New cards

GPG

Gnu Privacy Guard: Free implementation of OpenPGP standard

16
New cards

HMAC

Hashed Message Authentication Code: Specific type of message authentication code involving a hash function

17
New cards

HSM

Hardware Security Module: Physical device managing digital keys and performing cryptographic functions

18
New cards

IDEA

International Data Encryption Algorithm: Symmetric-key block cipher

19
New cards

IKE

Internet Key Exchange: Protocol used to set up security associations in IPsec

20
New cards

IPSec

Internet Protocol Security: Protocol suite securing IP communications through authentication and encryption

21
New cards

IV

Initialization Vector: Input to cryptographic primitive to ensure unique ciphertexts

22
New cards

KDC

Key Distribution Center: Part of a cryptosystem that distributes keys

23
New cards

KEK

Key Encryption Key: Key used to encrypt other keys

24
New cards

MAC

Message Authentication Code: Information used to verify message authenticity

25
New cards

MD5

Message Digest 5: Widely used (now insecure) cryptographic hash function

26
New cards

P12

PKCS #12: Archive file format for storing private keys with certificates

27
New cards

PBKDF2

Password-based Key Derivation Function 2: Key derivation function with a configurable number of iterations

28
New cards

PEM

Privacy Enhanced Mail: Format for storing and sending cryptographic keys

29
New cards

PFS

Perfect Forward Secrecy: Property preventing past session key compromise

30
New cards

PGP

Pretty Good Privacy: Encryption program providing cryptographic privacy and authentication

31
New cards

PKCS

Public Key Cryptography Standards: Specifications for public-key cryptography

32
New cards

PKI

Public Key Infrastructure: Set of roles, policies, and procedures for creating and managing digital certificates

33
New cards

PSK

Pre-shared Key: Shared secret which is known by parties before communication

34
New cards

RC4

Rivest Cipher version 4: Stream cipher once widely used in protocols like WEP

35
New cards

RIPEMD

RACE Integrity Primitives Evaluation Message Digest: Family of cryptographic hash functions

36
New cards

RSA

Rivest, Shamir, & Adleman: Public-key cryptosystem for secure data transmission

37
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions: Standard for public key encryption and signing of email

38
New cards

SED

Self-encrypting Drives: Storage devices that encrypt all data automatically

39
New cards

SHA

Secure Hashing Algorithm: Family of cryptographic hash functions

40
New cards

SSL

Secure Sockets Layer: Legacy protocol for encrypted communications (replaced by TLS)

41
New cards

TLS

Transport Layer Security: Cryptographic protocol securing communications over networks

42
New cards

TSIG

Transaction Signature: Provides authenticated DNS transactions

43
New cards

XOR

Exclusive Or: Logical operation often used in cryptography