Information Assurance 5 Flashcards
a broad, umbrella term that encompasses both cryptography and cryptanalysis
Cryptology
protecting data by hiding it from anyone who isn’t supposed to see, access, or change it
Cryptography
figuring out how to access the data without having the necessary cryptographic key
Cryptanalysis
is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it
Encryption
is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely
Cryptosystem
this type of cryptography uses a single key for both encryption and decryption
Symmetric
allows users to encrypt information
using shared keys
Asymmetric
is the process of converting an encrypted message back to its original (readable) format
Decryption
the original message
Plaintext
a method by which Caesar was able to secretly communicate with his generals without anyone being able to read the messages
Caesar Cipher
which has a better performance and a faster speed, symmetric or asymmetric?
Symmetric
another word for algorithm
Cipher
the process of asymmetric cryptography
- Registration
- Lookup
- Encrypt
- Decode
- Reply
pros of asymmetric cryptography
- Security
- Transparency
- Appearance
cons of asymmetric cryptography
- Speed
- Vulnerabilities
- Loss
- Long-term sustainability
are one way mathematical functions that take an input of any length and produce a fixed size output, called a hash
Hash functions
a symmetric algorithm that uses the same key to encrypt and decrypt protected data
Advanced Encryption Standard (AES)
is based on public key encryption (asymmetric) technology which is a public key cryptosystem for reliable data transmission
Rivest, Shamir, Adleman (RSA) algorithm
is a widely used cryptographic hash function that results in a 128 bit hash value
Message Digest algorithm 5 (MD5)
used for hashing data and certificate files
Secure Hash Algorithm (SHA)
is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents
Digital Signature
digital signature assurances
- Authenticity
- Integrity
- Non-repudiation
- Notarization
issues digital certificates, signs certificates to verify their validity and tracks which certificates have been revoked or have expired
Certificate Authority (CA)