cryptograhpgy

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Algorithm

A step-by-step procedure; typically an established computation for solving a problem within a set number of steps.

2
New cards

Block cipher

A cipher that operates on blocks of data.

3
New cards

Collision attack

An attack on a hash function, in which a specific input is generated to produce a hash function output that matches another input.

4
New cards

Cryptanalysis

The process of attempting to break a cryptographic system.

5
New cards

Cryptography

The art of secret writing that enables an individual to hide the contents of a message or file from all but the intended recipient.

6
New cards

Diameter

The base protocol that is intended to provide an authentication, authorization, and accounting (AAA) framework for applications such as network access or IP mobility. Diameter is a draft IETF proposal.

7
New cards

Hash

Form of encryption that creates a digest of the data put into the algorithm.

8
New cards

Key

In cryptography, a sequence of characters or bits used by an algorithm to encrypt or decrypt a message.

9
New cards

Keyspace

The entire set of all possible keys for a specific encryption algorithm.

10
New cards

Linear cryptanalysis

The use of linear functions to approximate a cryptographic function as a means of analysis.

11
New cards

Multiple encryption

The use of multiple layers of encryption to improve encryption strength.

12
New cards

Bcrypt

Key-stretching mechanism that uses the Blowfish cipher and salting, and adds an adaptive function to increase the number of iterations.

13
New cards

Birthday attack

A special type of brute-force attack that gets its name from the birthday paradox.

14
New cards

Cipher suite

An arranged group of algorithms.

15
New cards

Cryptographic service provider (CSP)

A software library that implements cryptographic functions.

16
New cards

Crypto modules

A module that uses a hardware, software, or hybrid cryptographic engine contained within the boundary.

17
New cards

Data at rest

A state of data in a computing system that is typically referred to as data encryption.

18
New cards

Data in transit

A state of data in a computing system that is at risk of interception while being transported across a network.

19
New cards

Data in use

Data that is stored in a nonpersistent state of either RAM, CPU caches, or CPU registers.

20
New cards

Digital rights management (DRM)

The process for protecting intellectual property from unauthorized use.

21
New cards

Digital signature

Provides a means of verifying authenticity and integrity of a message.

22
New cards

DNSSEC

A protocol for the translation of names into IP addresses.

23
New cards

Ephemeral keys

Cryptographic keys that are used only once after they are generated.

24
New cards

Federal Information Processing Standards Publications (FIPS PUBS)

Describe various standards for data communication issues.

25
New cards

FTPS

The implementation of FTP over an SSL/TLS secured channel.

26
New cards

HMAC-based one-time password (HOTP)

An algorithm that is a key component of the Open Authentication Initiative (OATH).

27
New cards

Hypertext Transfer Protocol Secure (HTTPS)

The use of SSL or TLS to encrypt a channel over which HTTP traffic is transmitted.

28
New cards

IPsec

A collection of IP security features designed to introduce security at the network layer.

29
New cards

Key escrow

The process of keeping a copy of the encryption key with a trusted third party.

30
New cards

Key exchange

The central foundational element of a secure symmetric encryption system.

31
New cards

Key stretching

A mechanism that takes what would be weak keys and 'stretches' them to improve security.

32
New cards

Lightweight Directory Access Protocol Secure (LDAPS)

Involves the use of an SSL tunnel to connect LDAP services.

33
New cards

Message integrity

A crucial component of message security, ensuring a document has not been tampered with.

34
New cards

Password-Based Key Derivation Function 2 (PBKDF2)

A key-derivation function designed to produce a key derived from a password.

35
New cards

Pretty Good Privacy (PGP)

A popular program that is used to encrypt and decrypt e-mail and files.

36
New cards

Rainbow tables

Precomputed tables or hash values associated with passwords to crack them.

37
New cards

Replay attack

Attacks that work against cryptographic systems by reusing previously recorded packets.

38
New cards

Secure IMAP

IMAP over a SSL/TLS session.

39
New cards

Secure POP3

POP3 over a SSL/TLS session.

40
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A standard for public key encryption and signing of e-mails.

41
New cards

Secure Real-time Transport Protocol (SRTP)

A network protocol for securely delivering audio and video over IP networks.

42
New cards

Secure Shell (SSH)

An encrypted remote terminal connection program used for remote connections to a server.

43
New cards

Secure Sockets Layer (SSL)

An application of encryption technology developed for transport-layer protocols across the Web.

44
New cards

Session key

A symmetric key used for encrypting messages during a communication session.

45
New cards

SFTP

Involves the use of FTP over an SSH channel.

46
New cards

Simple Network Management Protocol version 3 (SNMPv3)

A standard for managing devices on IP-based networks.

47
New cards

Steganography

An offshoot of cryptography technology that means covered.

48
New cards

Transport encryption

Used to protect data that is in motion.