9781260464009-Chapter-16-Cryptographic-Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Cryptography

The science and art of encrypting information, ensuring its confidentiality, authenticity, and integrity during transmission and storage.

2
New cards

Cipher

A systematic method for transforming readable information into an unreadable format, allowing secure communication. The term originates from the Arabic word 'sifr,' which signifies empty or zero.

3
New cards

Plaintext

The original and unencrypted text or data that is easily readable; it is the input for encryption algorithms to generate ciphertext.

4
New cards

Ciphertext

The encrypted output resulting from applying an encryption algorithm to plaintext, rendering it unreadable without the proper decryption method.

5
New cards

Digital Signature

A cryptographic mechanism that uses public key cryptography to authenticate the origin of a digital message, ensuring that it has not been altered.

6
New cards

Key Length

The size of cryptographic keys, usually measured in bits, which directly affects the security level of encryption; longer keys generally provide stronger security.

7
New cards

Symmetric Encryption

A method of encryption where the same secret key is used for both encrypting and decrypting messages, requiring a secure way to share the key.

8
New cards

Asymmetric Encryption

A cryptographic system that employs a pair of keys: a public key used for encryption and a private key used for decryption, enhancing security for key distribution.

9
New cards

Hash Function

A computational algorithm that converts input data of any size into a fixed-size string of characters, typically used to ensure data integrity and security.

10
New cards

Key Exchange

The method by which cryptographic keys are securely shared between parties, enabling encrypted communication without the risk of interception.

11
New cards

Perfect Forward Secrecy

A cryptographic principle guaranteeing that session keys are not compromised even if the long-term private key is eventually breached, enhancing privacy.

12
New cards

Quantum Cryptography

The application of quantum mechanics principles to create secure communication channels, relying on quantum phenomena to ensure information privacy.

13
New cards

Lightweight Cryptography

Cryptographic schemes designed to operate effectively in environments with limited resources, such as IoT devices, by minimizing processing and memory usage.

14
New cards

Steganography

The method of concealing a message within another medium (e.g., embedding data within images), thus making the presence of the message undetectable.

15
New cards

Nonce

A unique number or value used only once in a cryptographic session to prevent replay attacks by ensuring freshness and uniqueness in transactions.

16
New cards

Entropy

A measure of randomness and unpredictability in cryptographic keys or systems, with higher entropy indicating stronger security against attacks.

17
New cards

Homomorphic Encryption

An advanced encryption technique that permits computations to be performed on ciphertext without revealing the underlying plaintext, preserving privacy.

18
New cards

Blockchain

A decentralized ledger technology that records transactions in a secure, immutable manner across a network of computers, ensuring transparency and resistance to tampering.

19
New cards

Elliptic Curve Cryptography (ECC)

A form of public key cryptography based on the properties of elliptic curves, allowing for smaller keys compared to other systems while maintaining equal security levels.

20
New cards

Key Stretching

A technique that reinforces weak cryptographic keys by applying additional computational efforts, thereby increasing the resistance to brute-force attacks.

21
New cards

Authenticated Encryption with Associated Data (AEAD)

An encryption scheme that simultaneously provides confidentiality for the data and integrity checks for associated data, ensuring both aspects are secure.

22
New cards

Counter Mode (CTM)

An encryption method that transforms a block cipher into a stream cipher by encrypting a sequential counter value and combining it with the plaintext.

23
New cards

Cipher Block Chaining (CBC)

An encryption mode that links the encryption of blocks such that each plaintext block is combined with the previous ciphertext block to enhance security.

24
New cards

Stream Ciphers

Encryption algorithms designed to encrypt data bit by bit or byte by byte, making them ideal for real-time applications requiring minimal latency.

25
New cards

Block Ciphers

Cryptographic algorithms used to encrypt data in fixed-size blocks, forming the basis of many encryption standards for secure communications.

26
New cards

Nonrepudiation

A critical principle in cryptography that ensures that a sender cannot deny sending a message, thus providing proof of the origin and integrity of transmitted data.