6.0 Digital Locksmithing - Cryptography and Encryption PowerPoint.docx

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 20

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

21 Terms

1

Cryptography

The art and science of protecting digital information by converting it into a secure format.

New cards
2

Encryption

The process of converting plaintext information into an unreadable format (ciphertext) to protect it from unauthorized access.

New cards
3

Plaintext

Data that is in its natural, readable format, which is vulnerable to interception.

New cards
4

Ciphertext

The encrypted output of plaintext data, rendered unreadable to anyone except the intended recipients.

New cards
5

Key

A piece of information that determines the output of a cryptographic algorithm, used in both encryption and decryption processes.

New cards
6

Decryption

The process of converting ciphertext back into plaintext using the cryptographic algorithm and the appropriate decryption key.

New cards
7

Symmetric Encryption

An encryption method where the same key is used for both encryption and decryption.

New cards
8

Asymmetric Encryption

An encryption method that uses a pair of keys; one for encryption (public key) and one for decryption (private key).

New cards
9

Hash Functions

Algorithms that take an input to produce a fixed-size string output, known as a 'digest', used for verifying data integrity.

New cards
10

Digital Certificate

An electronic document that verifies the identity of a person, device, or organization, crucial for secure online communications.

New cards
11

Non-repudiation

A property ensuring that a person cannot deny the authenticity of their signature on a document or the sending of a message.

New cards
12

Public Key Infrastructure (PKI)

A framework that manages digital certificates and public-key encryption to secure communications and verify identities.

New cards
13

Brute Force Attack

An attack method that involves systematically trying every possible key combination to gain unauthorized access to encrypted data.

New cards
14

Man-in-the-Middle (MitM) Attack

An attack where an attacker intercepts communication between two parties, potentially altering the communication.

New cards
15

Quantum Cryptography

A method that uses the principles of quantum mechanics to secure data, promising theoretically unbreakable security.

New cards
16

Post-Quantum Cryptography

Cryptographic algorithms that are designed to be secure against potential quantum computer attacks.

New cards
17

Algorithm

A set of well-defined instructions or rules designed to perform a specific task, especially in the context of encryption.

New cards
18

Integrity

A key aspect of data security that ensures information remains accurate and unaltered during storage or transmission.

New cards
19

Availability

In the context of cybersecurity, it refers to ensuring that data and services are available to authorized users when needed.

New cards
20

Format-Preserving Encryption (FPE)

A type of encryption that keeps the format of the plaintext intact while encrypting it.

New cards
21

Homomorphic Encryption

An encryption method that allows computation on ciphertexts, enabling privacy-preserving data processing.

New cards
robot