Encryption and Secure Exchanges Flashcards
Define “ciphertext”.
Text that has been mathematically scrambled so that its meaning cannot be determined without the use of an algorithm and key.
Describe the use of secure electronic transactions (SET) protocols.
A protocol that is often used in credit card payments. Used by the merchant to securely transmit payment information and authenticate trading partner identity.
Define “encryption”.
The process of coding data so that it cannot be understood without the correct decryption algorithm.
Describe symmetric encryption (also called single-key encryption or private-key encryption).
Uses a single algorithm to encrypt and decrypt. Sender uses the encryption algorithm to create the cipher text an sends the encrypted text to the recipient. Sender tells recipient which algorithm was used to encrypt. The recipient uses the algorithm to decrypt. Common in data storage applications.
Identify the two internet protocols that are typically used for secure Internet transmission protocols.
Sensitive data sent via the internet is usually secured by one of two encryption protocols: SSL (Secure Sockets Layer) or S-HTTP (Secure Hypertext Transport Protocol).
Describe how digital signatures work.
Uses public/private key pair technology to provide authentication of the sender and verification of the content of the message.
Define “cleartext (or plaintext)”.
Text that can be read and understood.
Describe how digital certificates work.
Provides legally recognized electronic identification of the sender and verifies the integrity of message content. Based on public/private key technology (like the digital signature).
Describe asymmetric encryption (also called public/private-key encryption and private-key encryption).
Uses two paired encryption algorithms to encrypt and decrypt the text: if the public key encrypts, the private key decrypts. If the private key encrypts, the public key decrypts.