Cryptography Primer 4.1 Flashcards
Is a digital object that is tied to cryptographic key pair; use case Authentication
Digital Certificates
Mathematically complex modern cipher
Algorithm
Secret valued used with an algorithm
Key(crypto variable)
Term used to describe a weak cryptographic element
Deprecated
A separate processor and micro kernel used for storing and processing cryptographic keys in mobile devices
Secure enclave
Number of possible key combinations
Keyspace
Is the process of encoding information; use case Confidentiality
Encryption
Is a one-way function that turns a file or string of text into a unique digits of the message; use case Integrity
Hashing
Term that the algorithm and/or key length is exploitable
Broken
Is a harden, tamper-resistant hardware device that secures cryptographic keys and related information
Hardware Security Module (HSM)
Consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working together in a comprehensive manner to enable communication
Public Key Infrastructure (PKI)
Is a hardware chip used for storing cryptographic keys related information
Trusted Platform Module(TPM)
Is a hash value encrypted using the senders private key; use case sender Authenticity non-repudiation
Digital Signature
Is a technique that transforms plaintext into cipher text and back to plaintext
Cipher
Is encrypted or human unreadable text
Ciphertext