Chapter 8: Cryptography Flashcards
Cryptographic algorithms that use two different keys - one key to encrypt and another to decrypt.
Asymmetric cipher
An authentication protocol that periodically reauthenticates.
Challenge Handshake Authentication Protocol (CHAP)
When two different inputs into a cryptographic hash produce the same output.
Collision
A function that is one-way (nonreversible), has a fixed length output, and is collision resistant.
Cryptographic hash
A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes.
PRNG
A table of precomputed hashes used to guess passwords by searching for the hash of a password.
Rainbow table
Bits added to a hash to make it resistant to rainbow table attacks.
Salt
Any cryptographic algorithm that uses the same key to encrypt and decrypt.
Symmetric cipher
This standard is the most widely used standard for digital certificates.
X.509