Ch. 5 Flashcards
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
Advanced Encryption Standard (AES)
Procedures based on a mathematical formula used to encrypt and decrypt the data
algorithm
Cryptography that uses two mathematically related keys
asymmetric cryptographic algorithm
a cipher that manipulates an entire block of plaintext at one time
block cipher
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits
Blowfish
data that has been encrypted
ciphertext
unencrypted data
cleartext
The science of transforming information into a secure form so that unauthorized persons cannot access it
cryptography
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
Data Encryption Standard (DES)
the process of changing ciphertext into plaintext
decryption
a key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created
Diffie-Hllman (DH)
A Diffie-Hellman key exchange that uses different keys
Diffie-Hellman Ephemeral (DHE)
The unique digital fingerprint created by a one-way hash algorithm
digest
an electronic verification of the sender
digital signature
An algorithm that uses elliptic curves instead of prime numbers to compute keys
elliptic curve cryptography (ECC)
A Diffie-Hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation
Elliptic Curve Diffie-Hellman (ECDH)
The process of changing plaintext into ciphertext
encryption
a temporary key that is used only once before it is discarded
ephemeral key
free and open-source software that is commonly used to encrypt and decrypt data
GNU Privacy Guard (GPG)
A secure cryptographic processor
Hardware Security Module (HSM)
an algorithm that creates a unique digital fingerprint
hash
A hash function that is applied to both the key and the message
Hashed Message Authentication code (HMAC)
Exchanging secure information within normal communication channels
in-band
A mathematical value entered into a cryptographic algorithm to produce encrypted data
key
the process of sending and receiving secure cryptographic keys
key exchange
A common hash algorithm with several different versions
message digest (MD)
The current version of MD
Message Digest 5 (MD5)
the process of proving that a user performed an action
non-repudiation