Module 3 & 4 Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

algorithm

A set of procedures based on a mathematical formula used to encrypt and decrypt the data. Also called a cipher.

2
New cards

cipher

algorithm

3
New cards

asymmetric cryptographic algorithm

Cryptography that uses two mathematically related keys.

4
New cards

birthday attack

A statistical phenomenon that makes finding collisions easier.

5
New cards

blockchain

A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.

6
New cards

collision

When two files have the same hash.

7
New cards

cryptography

The practice of transforming information so that it is secure and cannot be understood by unauthorized persons.

8
New cards

database-level encryption

Applying cryptography to a database.

9
New cards

decryption

The process of changing encrypted text into the original text.

10
New cards

digital signature

An electronic verification of the sender.

11
New cards

encryption

The process of changing plaintext into ciphertext.

12
New cards

downgrade attack

An attack in which the system is forced to abandon the current higher security mode of operation and “fall back” to implementing an older and less secure mode.

13
New cards

file-level encryption

To encrypt or decrypt files individually.

14
New cards

full-disk encryption (FDE)

A technology to protect the entire hard drive using cryptography including the installed OS.

15
New cards

hardware security module (HSM)

A removable external cryptographic device.

16
New cards

hashing

The process of creating a digital fingerprint.

17
New cards

key exchange

The process of sending and receiving secure cryptographic keys.

18
New cards

key length

The number of bits in a key.

19
New cards

nonrepudiation

The process of proving that a user performed an action.

20
New cards

open public ledger

A public blockchain in which anyone can join the blockchain network and become part of it.

21
New cards

partition-level encryption

Applying cryptography to a partition of a hard drive.

22
New cards

record-level encryption

Applying cryptography to database records.

23
New cards

secure enclave

A technology for Apple and Android devices similar to TPM for PCs.

24
New cards

steganography

Hiding the existence of data within another type of file, such as an image file.

25
New cards

symmetric cryptographic algorithm

Encryption that uses a single key to encrypt and decrypt a message.

26
New cards

Trusted Platform Module (TPM)

An international standard for crypto processors.

27
New cards

volume-level encryption

Applying cryptography to a volume of a hard drive.

28
New cards

certificate authority (CA)

The entity that is responsible for digital certificates.

29
New cards
30
New cards

certificate revocation list (CRL)

A list of certificate serial numbers that have been revoked.

31
New cards

certificate signing request (CSR) generation

The process for requesting a digital certificate.

32
New cards

code signing

A process by which software developers digitally sign a program to prove that the software comes from the entity that signed it and that no unauthorized third party has altered it.

33
New cards

digital certificate

A technology used to associate a user’s identity to a public key and that has been “digitally signed” by a trusted third party.

34
New cards

Internet Protocol Security (IPSec)

A protocol suite for securing IP communications.

35
New cards

key escrow

A process in which keys are managed by a third party, such as a trusted CA.

36
New cards

key management system

A method of controlling public keys, private keys, and digital certificates.

37
New cards

Online Certificate Status Protocol (OCSP)

A process that performs a real-time lookup of a certificate’s status.

38
New cards

public key infrastructure (PKI)

The underlying infrastructure for the management of keys and digital certificates at scale.

39
New cards

root of trust

Tracing a certificate back to the highest level of a CA.

40
New cards

self-signed

A signed digital certificate that does not depend on any higher-level authority for authentication.

41
New cards

third party

An entity that is trusted by others.

42
New cards

transport/communication encryption

Cryptographic algorithms that are used to protect data in transit.

43
New cards

Transport Layer Security (TLS)

A widespread cryptographic transport algorithm that replaces SSL.

44
New cards

tunneling

Data that is encapsulated within a secure outer shell.

45
New cards

wildcard digital certificate

A certificate used to validate a main domain along with all subdomains.

46
New cards

CA

certificate authority

47
New cards

CRL

certificate revocation list

48
New cards

CSR

certificate signing request

49
New cards

IPSec

Internet Protocol Security

50
New cards
51
New cards

OCSP

Online Certificate Status Protocol

52
New cards

PKI

public key infrastructure

53
New cards

TLS

Transport Layer Security