3.0 Cryptographic Solutions Flashcards
The science and practice of altering data to make it unintelligible to unauthorized parties.
Cryptography
Unencrypted data that is meant to be encrypted before it is transmitted, or the result of the decryption of encrypted data.
Plaintext
Data that has been enciphered and cannot be read without the cipher key.
Ciphertext
Operations that transform a plaintext into a ciphertext with cryptographic properties; also called a cipher.
Algorithm
Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.
Encryption
In cryptography, a specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption.
Key
Two-way encryption scheme in which encryption and decryption are both performed by the same key. Also known as shared-key encryption.
Symmetric encryption
Size of a cryptographic key in bits. Longer keys generally offer better security, but key lengths for different ciphers are not directly comparable.
Key length
Cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) alogrithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example.
Asymmetric algorithm
During asymmetric encryption, this key is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.
Public key
In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with whom the holder wants to communicate securely. A private key can be used to encrypt data that can be decrypted by the linked public key or vice versa.
Private key
A concept in which an expanding list of transactional records listed in a public ledger is secured using cryptography.
Blockchain
Distributed public record of transactions that underpins the integrity of blockchains.
Open public ledger
The practice of concealing a file, message, image, or video within another file, message, image, or video.
Steganography
A technique that essentially hides or camouflages code or other information so that it is harder to read by unauthorized users.
Obfuscation
A technique for obscuring the presence of a message, often by embedding information within a file or other entity.
Steganography
A de-identification method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data.
Data masking
A de-identification method where a unique token is substituted for real data.
Tokenization
In public key infrastructure (PKI), procedures and tools that centralizes generation and storage of cryptographic keys.
Key management system
Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.
Trusted Platform Module (TPM)
Methods exposed by a script or program that allow other scripts or programs to use it. For example, an _______ enables software developers to access functions of the TCP/IP network stack under a particular operating system.
Application programming interface (API)
CPU extensions that protect data stored in system memory so that an untrusted process cannot read it.
Secure enclave
A function that converts an arbitrary-length string input to a fixed-length string output. A cryptographic hash function does this in a way that reduces the chance of collisions, where two different inputs produce the same output.
Hashing algorithm
A single hash function, symmetric cipher, or asymmetric cipher.
Cryptographic primitive
A message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity.
Digital signature
A security countermeasure that mitigates the impact of precomputed hash table attacks by adding a random value to each plaintext input.
Salt
A technique that strengthens potentially weak input for cryptographic key generation, such as passwords or passphrases created by people, against brute force attacks.
Key stretching
A cryptographic hashing algorithm created to address possible weaknesses in multi-domain authentication (MDA).
Secure Hash Algorithm (SHA)