7.2 Cryptography Implementations Flashcards
Hybrid cryptosystem
A hybrid cryptosystem combines the efficiency of symmetric encryption with the convenience of asymmetric encryption.
Digital signature
A digital signature is a combination of asymmetric encryption and hashing values. A signature provides confidentiality, integrity validation, strong authentication, and non-repudiation.
Hashing
The process of using an algorithm to convert data to a fixed-length key called a hash.
Trusted Platform Module
TPM is a hardware chip on the motherboard that can generate and store cryptographic keys.
Hardware security module
(HSM)
A hardware security module (HSM) is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.
How can cryptography support the goals of information security?
Why is reusing encryption keys considered a weakness?
What is a digital signature? What benefits does it provide?
What are the three main hashing algorithms in use today?
What functionality does a Trusted Platform Module (TPM) chip provide?