Chapter 12: Encryption Basics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

algorithm

A step-by-step set of rules used to perform encryption or decryption.

2
New cards

asymmetric encryption

A type of encryption that uses a pair of keys: one for encryption (public key) and one for decryption (private key).

3
New cards

authentication

The process of verifying the identity of a person or system before granting access.

4
New cards

cipher

An algorithm for performing encryption or decryption.

5
New cards

ciphertext

Encrypted data that has been transformed using a cipher.

6
New cards

cryptography

The science of protecting information by transforming it into unreadable formats, and then back again.

7
New cards

cryptanalysis

The study and practice of breaking encrypted codes without knowing the key.

8
New cards

data integrity

Ensuring that data has not been changed or tampered with during transmission or storage.

9
New cards

decryption

The process of converting encrypted data back into its original, readable form.

10
New cards

digital certificate

An electronic document used to prove ownership of a public key, typically issued by a trusted Certificate Authority (CA).

11
New cards

digital signature

A secure digital code attached to a message or document that proves it came from a specific sender and hasn't been altered.

12
New cards

encryption

The process of converting information into a secret code to protect it from unauthorized access.

13
New cards

end-to-end encryption

A secure communication method that ensures only the sender and the recipient can read the messages.

14
New cards

hashing

A process that converts data into a fixed-length value or string, typically used for storing passwords securely.

15
New cards

key

A string of data used by a cipher to encrypt or decrypt information.

16
New cards

key management

The process of handling encryption keys, including their creation, exchange, storage, and disposal.

17
New cards

one-time pad

An extremely secure encryption method that uses a single-use random key as long as the message itself.

18
New cards

plaintext

Original, unencrypted data (e.g., a message, document, or file).

19
New cards

private key

A key used in asymmetric encryption to decrypt messages, kept secret by the receiver.

20
New cards

public key

A key used in asymmetric encryption that is shared publicly to encrypt messages.

21
New cards

symmetric encryption

A type of encryption where the same key is used for both encryption and decryption.