Chapter 7 Key Terms Flashcards
Cryptography
The science and study of concealing information.
Cipher/Algorithm
The process or formula used to encrypt a message or otherwise hide the message’s meaning.
Encryption key
A string of bits randomly generated using a specific cipher. An encryption key is used to encrypt or decrypt data.
Plaintext
The readable form of a message.
Ciphertext
The encrypted form of a message that is readable only by those for whom the message is intended.
Encryption
The process of using an algorithm or cipher to transform data from cleartext to ciphertext in order to protect the confidentiality, integrity, and authenticity of the message.
Decryption
The process of converting data from ciphertext into plaintext.
Steganography
The practice of concealing a file, message, image, or video within another file, message, image, or video.
Blockchain
A decentralized and distributed ledger of transactions between two or more parties. Blockchain uses cryptography to keep sensitive data secure.
Hybrid Cryptosystem
A hybrid cryptosystem combines the efficiency of symmetric encryption with the convenience of asymmetric encryption.
Digital Signature
A digital signature is a combination of symmetric encryption with the convenience of asymmetric encryption.
Hashing
The process of using an algorithm to convert data to a fixed-length key called a hash.
Trusted Platform Module
TPM is a hardware chip on the motherboard that can generate and store cryptographic keys.
Hardware security module
A hardware security module (HSM) is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.
Hash
A function that converts a variable-length string into a compressed, fixed-length value known as a message digest or hash.