Lesson 4

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:12 PM on 1/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Secure Enclave

Separate processor and microkernel for storing and handling cryptographic keys, used in mobile devices

2
New cards

Trusted Platform Module (TPM)

Hardware chip for storing cryptographic keys

3
New cards

Digital Certificates

An object linked to website / service that can be used to prove its authenticity

4
New cards

Key

A cryptographic variable, the secret in an algorithm

5
New cards

Deprecated

Cryptographic element is able to be used, but risky and highly discouraged (e.g 3DES)

6
New cards

Hashing

The process of converting a file / string to it’s unique token / hash pairing

7
New cards

Broken

A cryptographic element that has known exploit(s)

8
New cards

Encryption

Encoding data so it cannot be read, confidentiality

9
New cards

Hardware Security Module (HSM)

A physical device that stores cryptographic keys (e.g thumbdrive)

10
New cards

Public Key Infrastructure (PKI)

The grouping of technologies / techniques that allow for secure communication between two parties (e.g browser and web server)

11
New cards

Trusted Platform Module

A hardware chip responsible for storing cryptographic keys

12
New cards

Digital Signatures

A way for a sender to prove the integrity of what they are sending, and proof they actually sent it (non-repudiation)

13
New cards

Cipher

A recipe for converting plaintext to cipher text

14
New cards

Algorithm

A mathmatically complex cipher that needs a computer to solve

15
New cards

Secure Enclave

A separate processor and microkernel for storing and processing cryptographic keys, used in mobile devices

16
New cards

Ciphertext

The version of plaintext after the cipher recipe has been applied

17
New cards

Cryptography

The field of making something a secret

18
New cards

El Gamal

An asymmetric algorithm, used for key exchange

19
New cards

KMPS

Key Management Practice Statement, document detailing an organization’s key management practices

20
New cards

ECC

Asymmetric Algorithm, less common

21
New cards

3DES

Deprecated symmetric algorithm

22
New cards

Private key

Kept secret, paired with matching public key

23
New cards

Key

A secret used as part of an algorithm

24
New cards

Encryption

A way of protecting the confidentiality of data in transit and data at rest

25
New cards

RC4

A symmetric algorithm used for streams of data

26
New cards

Asymmetric

An encryption method that uses two keys

27
New cards

RSA

Asymmetric algorithm, the U.S standard

28
New cards

Public Key

Freely distributed, used as part of asymmetric algorithm

29
New cards

Symmetric

An encryption process that uses a single shared key

30
New cards

Diffie-Hellman

An asymmetric algorithm, used for key sharing

31
New cards

Session Key

A symmetric key that acts as the shared key for the entire period of communication

32
New cards

Hash

A unique fixed length string

33
New cards

HMAC

Hashed Message Authentication Code (HMAC), a hash value paired with symmetric key, used in TLS / IPsec

34
New cards

Collison

When two variable length inputs come out with the same hash value

35
New cards

RSA

Asymmetric encryption algorithm, also a digital signature algorithm

36
New cards

RIPEMD

The hash function used in Bitcoin

37
New cards

Message Digest

A hash value that assures receivers that the message is authentic from when the sender first wrote it

38
New cards

SHA

A hashing function, first version is insecure but second and third versions are gold standard today

39
New cards

One way representation

Can go from A to B, but can not go backwards from B to A

40
New cards

MD

A hash function, not safe for cryptographic use

41
New cards

Fingerprint

Type of hash value

42
New cards

DSA

The digital signature algorithm used by the U.S government

43
New cards

Certificate Authority (CA)

An organization that manages applications and distribution of a trusted digital certificate

44
New cards

Extended Validation

Type of digital certificate, domain and organization go through a standardized verification process

45
New cards

Registration Authority (RA)

Offloads some work from the Certificate Authority (CA), can only review requests and deliver certificates, cannot create new certificates

46
New cards

Web of Trust

An auditing process you can go through to get your self signed certificate to be considered trusted by major Certificate Authorities (CA)

47
New cards

Certification Revocation List (CRL)

A CA-managed list of revoked certificates, either downloaded by user or periodically pushed from certificate authority

48
New cards

Online Certificate Status Protocol (OCSP)

Queries the status of certificates in real time

49
New cards

X.509

The standard that governs Digital Certificates

50
New cards

Root Certificate

The top level certificate that verifies a certificate authorities entire PKI. Remains private and offline

51
New cards

Intermediate Certificate

A public, online CA that can be used to trace trust back to the CA’s root certificate