3 - 7: Cryptographic Applications Flashcards
Transport Layer Security
A protocol which uses other cryptographic algorithms and cipher suites. Once a request is made: 1) the server tells the client which of the cipher suites it would like to use for the communication and 2) the server sends the client the server’s digital certificate.
Session Key
In TLS, once the client is satisfied with the server’s certificate, the client generates a random encryption key, or session key. The session key is encrypted with the server’s public key, then sends it back. The key allows continuous encrypted exchange
Ephemeral keys
Another name for session keys
Secure Sockets Layer
The precursor to TLS which has flaws and is outdated. At times used interchangeably with TLS
Information Rights Management
Enforce an information policy by: 1) Enforcing data rights 2) provisioning access 3) implementing access control models
Digital Rights Management
Provides intellectual property owners means to prevent unauthorized use
Smart Cards
Lightweight, low-power uses of encryption. Either the card itself or the receiver must have or transmit enough power for the encryption keys to be read.
Blockchain
A distributed, immutable, public ledger