3. Cryptography and Encryption

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

AES

Advanced Encryption Standard: Symmetric encryption algorithm widely used globally

2
New cards

AES-256

Advanced Encryption Standards 256-bit: AES implementation using 256-bit key length

3
New cards

CBC

Cipher Block Chaining: Mode of operation for block ciphers

4
New cards

CFB

Cipher Feedback: Mode of operation for block ciphers

5
New cards

CTM

Counter Mode: Mode of operation for block ciphers

6
New cards

DES

Digital Encryption Standard: Older encryption algorithm now considered insecure

7
New cards

DHE

Diffie-Hellman Ephemeral: Key exchange protocol providing forward secrecy

8
New cards

ECC

Elliptic Curve Cryptography: Public-key cryptography based on elliptic curve theory

9
New cards

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral: Key exchange mechanism providing forward secrecy

10
New cards

ECDSA

Elliptic Curve Digital Signature Algorithm: Digital signature algorithm using elliptic curves

11
New cards

EFS

Encrypted File System: Microsoft Windows feature for file encryption

12
New cards

ESP

Encapsulated Security Payload: Part of IPsec protocol suite providing encryption

13
New cards

FDE

Full Disk Encryption: Encryption of entire contents of a storage device

14
New cards

GCM

Galois Counter Mode: Mode of operation for symmetric key cryptographic block ciphers

15
New cards

GPG

Gnu Privacy Guard: Free implementation of OpenPGP standard

16
New cards

HMAC

Hashed Message Authentication Code: Specific type of message authentication code involving a hash function

17
New cards

HSM

Hardware Security Module: Physical device managing digital keys and performing cryptographic functions

18
New cards

IDEA

International Data Encryption Algorithm: Symmetric-key block cipher

19
New cards

IKE

Internet Key Exchange: Protocol used to set up security associations in IPsec

20
New cards

IPSec

Internet Protocol Security: Protocol suite securing IP communications through authentication and encryption

21
New cards

IV

Initialization Vector: Input to cryptographic primitive to ensure unique ciphertexts

22
New cards

KDC

Key Distribution Center: Part of a cryptosystem that distributes keys

23
New cards

KEK

Key Encryption Key: Key used to encrypt other keys

24
New cards

MAC

Message Authentication Code: Information used to verify message authenticity

25
New cards

MD5

Message Digest 5: Widely used (now insecure) cryptographic hash function

26
New cards

P12

PKCS #12: Archive file format for storing private keys with certificates

27
New cards

PBKDF2

Password-based Key Derivation Function 2: Key derivation function with a configurable number of iterations

28
New cards

PEM

Privacy Enhanced Mail: Format for storing and sending cryptographic keys

29
New cards

PFS

Perfect Forward Secrecy: Property preventing past session key compromise

30
New cards

PGP

Pretty Good Privacy: Encryption program providing cryptographic privacy and authentication

31
New cards

PKCS

Public Key Cryptography Standards: Specifications for public-key cryptography

32
New cards

PKI

Public Key Infrastructure: Set of roles, policies, and procedures for creating and managing digital certificates

33
New cards

PSK

Pre-shared Key: Shared secret which is known by parties before communication

34
New cards

RC4

Rivest Cipher version 4: Stream cipher once widely used in protocols like WEP

35
New cards

RIPEMD

RACE Integrity Primitives Evaluation Message Digest: Family of cryptographic hash functions

36
New cards

RSA

Rivest, Shamir, & Adleman: Public-key cryptosystem for secure data transmission

37
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions: Standard for public key encryption and signing of email

38
New cards

SED

Self-encrypting Drives: Storage devices that encrypt all data automatically

39
New cards

SHA

Secure Hashing Algorithm: Family of cryptographic hash functions

40
New cards

SSL

Secure Sockets Layer: Legacy protocol for encrypted communications (replaced by TLS)

41
New cards

TLS

Transport Layer Security: Cryptographic protocol securing communications over networks

42
New cards

TSIG

Transaction Signature: Provides authenticated DNS transactions

43
New cards

XOR

Exclusive Or: Logical operation often used in cryptography