Module 03 Fundamentals of Cryptography

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

algorithm

A set of procedures based on a mathematical formula used to encrypt and decrypt the data. Also called a cipher.

2
New cards

asymmetric cryptographic algorithm

Cryptography that uses two mathematically related keys.

3
New cards

birthday attack

A statistical phenomenon that makes finding collisions easier.

4
New cards

blockchain


A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.

5
New cards

collision

When two files have the same hash.

6
New cards

cryptography

The practice of transforming information so that it is secure and cannot be understood by unauthorized persons.

7
New cards

database-level encryption

Applying cryptography to a database.

8
New cards

decryption

The process of changing encrypted text into the original text.

9
New cards

digital signature

An electronic verification of the sender.

10
New cards

downgrade attack

An attack in which the system is forced to abandon the current higher security mode of operation and “fall back” to implementing an older and less secure mode.

11
New cards

encryption

The process of changing plaintext into ciphertext.

12
New cards

file-level encryption

To encrypt or decrypt files individually.

13
New cards

full-disk encryption (FDE)

A technology to protect the entire hard drive using cryptography including the installed OS.

14
New cards

hardware security module (HSM)

A removable external cryptographic device.

15
New cards

hashing

The process of creating a digital fingerprint.

16
New cards

key exchange

The process of sending and receiving secure cryptographic keys.

17
New cards

key length

The number of bits in a key.

18
New cards

nonrepudiation

The process of proving that a user performed an action.

19
New cards

open public ledger

A public blockchain in which anyone can join the blockchain network and become part of it.

20
New cards

partition-level encryption

Applying cryptography to a partition of a hard drive.

21
New cards

record-level encryption

Applying cryptography to database records.

22
New cards

secure enclave

A technology for Apple and Android devices similar to TPM for PCs.

23
New cards

steganography

Hiding the existence of data within another type of file, such as an image file.

24
New cards

symmetric cryptographic algorithm

Encryption that uses a single key to encrypt and decrypt a message.

25
New cards

Trusted Platform Module (TPM)

An international standard for cryptoprocessors.

26
New cards

volume-level encryption

Applying cryptography to a volume of a hard drive.