Security+ 601 Cryptography Terms Flashcards
Means hidden/secret or confidential. This also provides non-repudiation/integrity or never changes
Cryptography
Unencrypted information or data sent in the clear
Plaintext
An algorithm used to encrypt or decrypt
Cipher
The art of cracking encryption. Researchers are constantly trying to find weaknesses in ciphers. This is also tells us that a mathematically flawed cipher is bad for everyone.
Cryptoanalysis
This helps programmers by providing a technique to where they don’t have to make keys from scratch. Numbers of this already exist to make key stretching algorithms
Key Stretching Libraries
This generates passwords and is an extension to the UNIX crypt library. This also uses a Blowfish cipher to perform multiple rounds of hashing
Bcrypt Library
Another key stretching library. This is part of the RSA public key cryptography standards (PKCS #5, RFC 2898). This is a library you can use to make your applications more secure.
Password -Based Key Derivation Function 2 (PBKDF2)
Performing cryptographic functions usually requires extensive CPU and additional resources, This helps provide cryptographic functions without extensive CPUs and additional functions.
Lightweight Cryptography
Encrypted data is difficult to work with. You have to decrypt data, perform a function, and encrypt the answer. This helps with the hard process of encryption. This also helps with performing calculations of data while its encrypted. This also performs the work directly on the encrypted data. Decrypted data can only be viewed with the private key.
Homomorphic encryption