Cryptography Terms (Ch. 8) Flashcards
Cryptographic algorithms that use two different keys, one key to encrypt and another to decrypt. Also called public key cryptography.
asymmetric cipher
An authentication protocol that periodically reauthenticates.
Challenge Handshake Authentication Protocol (CHAP)
When two different inputs into a cryptographic hash produce the same output, this is known as a __________.
collision
A function that is one-way (nonreversible), has a fixed length output, and is collision resistant.
cryptographic hash
an algorithm used to generate a number that is sufficiently random for cryptographic purposes.
pseudo-random number generator (PRNG)
A table of precomputed hashes used to guess passwords by searching for the hash of a password.
rainbow table
Bits added to a hash to make it resistant to rainbow table attacks.
salt
Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples.
symmetric cipher
this standard is the most widely used standard for digital certificates.
X.509