Cryptography Flashcards
Salting
A process where a computer adds a small amount of data to the end of a password before hashing.
Key Stretching
A technique used to slow the process of hashing.
HSM
Hardware Security Modules - a device which stores, encrypts, and decrypts passwords. It is often plugged into a USB port, and keys cannot be exported in a usable format.
Key (Cryptography)
A binary value which determines the value of the ciphertext. For a key length of n, there are 2^n possible keys.
Key Chain
A file which contains cryptographic keys.
Session Key
A key generated at each exchange of data. They are deleted after a session.
Symmetric Encryption
A form of encryption which uses the same key to decrypt data, such as ROT13.
DES
Data Encryption Standard - a program which splits plaintext into 64 bit blocks, each of which is then divided in half. One half is scrambled using an algorithm (F-function), before the halves are recombined, swapped, and the process repeated 16 times. Regular DES is no longer practically used due to increasing computing performance making decryption too easy.
3DES
Triple Data Encryption Standard - a standard for encryption which repeats DES three times. It uses a key-bundle with 2 to 3 DES keys, giving it a key size of 112 or 168 bits.
AES
Advanced Encryption Standard - a symmetric cipher with a key length of 128,192, or 256. It is used for purposes such as protecting hard disk data, voice call data, and password manager contents.
Private Key
A key used in asymmetric cryptography which is never seen by anyone other than the sender.
Public Key
A key used in asymmetric cryptography which can be seen by anyone.
Asymmetric Encryption
A form of encryption where each user has a public and private key. The private key can decrypt files encrypted with the paired public key and vice versa. Anyone sending data to Alice will use a copy of her public key, and only she can decrypt it using her private key.
Key Pair
The term for the combination of the public and private keys. Keys are typically quite large, at around 1024, 2048, or 4096 bits long.
Key Revocation
The act of a user marking a private key as no longer trusted, perhaps after forgetting it or losing it. This service is offered by public-key encryption software, and should involve users being updated as to the correct new public key.