6.0 Digital Locksmithing - Cryptography and Encryption PowerPoint.docx

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Cryptography

The art and science of protecting digital information by converting it into a secure format.

2
New cards

Encryption

The process of converting plaintext information into an unreadable format (ciphertext) to protect it from unauthorized access.

3
New cards

Plaintext

Data that is in its natural, readable format, which is vulnerable to interception.

4
New cards

Ciphertext

The encrypted output of plaintext data, rendered unreadable to anyone except the intended recipients.

5
New cards

Key

A piece of information that determines the output of a cryptographic algorithm, used in both encryption and decryption processes.

6
New cards

Decryption

The process of converting ciphertext back into plaintext using the cryptographic algorithm and the appropriate decryption key.

7
New cards

Symmetric Encryption

An encryption method where the same key is used for both encryption and decryption.

8
New cards

Asymmetric Encryption

An encryption method that uses a pair of keys; one for encryption (public key) and one for decryption (private key).

9
New cards

Hash Functions

Algorithms that take an input to produce a fixed-size string output, known as a 'digest', used for verifying data integrity.

10
New cards

Digital Certificate

An electronic document that verifies the identity of a person, device, or organization, crucial for secure online communications.

11
New cards

Non-repudiation

A property ensuring that a person cannot deny the authenticity of their signature on a document or the sending of a message.

12
New cards

Public Key Infrastructure (PKI)

A framework that manages digital certificates and public-key encryption to secure communications and verify identities.

13
New cards

Brute Force Attack

An attack method that involves systematically trying every possible key combination to gain unauthorized access to encrypted data.

14
New cards

Man-in-the-Middle (MitM) Attack

An attack where an attacker intercepts communication between two parties, potentially altering the communication.

15
New cards

Quantum Cryptography

A method that uses the principles of quantum mechanics to secure data, promising theoretically unbreakable security.

16
New cards

Post-Quantum Cryptography

Cryptographic algorithms that are designed to be secure against potential quantum computer attacks.

17
New cards

Algorithm

A set of well-defined instructions or rules designed to perform a specific task, especially in the context of encryption.

18
New cards

Integrity

A key aspect of data security that ensures information remains accurate and unaltered during storage or transmission.

19
New cards

Availability

In the context of cybersecurity, it refers to ensuring that data and services are available to authorized users when needed.

20
New cards

Format-Preserving Encryption (FPE)

A type of encryption that keeps the format of the plaintext intact while encrypting it.

21
New cards

Homomorphic Encryption

An encryption method that allows computation on ciphertexts, enabling privacy-preserving data processing.