15.1 - Cryptography

 15.1 - Cryptography 

 

Key Terms: 

  • Cryptography – The science and study of concealing information that is used in electronic communication. 

  • Cipher/Algorithm - A process or formula used to convert or hide the meaning of a message. 

  • Key – A variable in a cipher that is used to encrypt or decrypt a message. 

  • Plain text – The readable form of communication that is visible to everyone. 

  • Ciphertext – An encrypted form of communications that makes the communication unreadable. 

  • Encryption – The process of using an algorithm or cipher to transform data from clear text to ciphertext. 

  • Decryption – The process of converting data from ciphertext to plain text. 

  • Steganography – The process of hiding data or a message so that only the sender and receiver suspects that hidden data exists. 

  • Cryptanalysis – The method that is used to recover data that has been encrypted without having access to the key used in the encryption process. 

  • Symmetric Encryption – A form of encryption that provides confidentiality with a weak form of authentication of integrity. 

  • Block cipher – Symmetric encryption that transposes plain text to ciphertext in blocks. 

  • Stream cipher – Symmetric encryption that is performed on each bit within a stream of data in real time. 

  • Ron’s Cipher V5 or Ron’s Code v5 (RC5) - A symmetric cryptography method that implements a symmetric-key block cipher cryptographic algorithm produced by RSA Security Inc. 

  • Ron’s Cipher v6 or Ron’s Code v6 (RC6) - A symmetric block cipher cryptographic algorithm. 

  • International Data Encryption Algorithm (IDEA) - A symmetric encryption method that is a minor revision of PES. It uses 64-bit blocks with 128-bit keys. 

  • Data Encryption Standard (DES) - A very popular symmetric cryptography method created by the NSA. 

  • Triple DES (3DES) - An enhanced version of DES that corrects DES’s known weaknesses. 

  • Advanced Encryption Standard (AES) - An iterative symmetric block cipher that was developed as a replacement for DES in 2001. 

  • Blowfish – A keyed symmetric block cipher that was intended to be free of the problems associated with other algorithms and replace DES. 

  • Twofish – A symmetric block cipher that permits a wide variety of tradeoffs between speed, size, key setup time and memory. 

  • Asymmetric encryption – An encryption method that uses two mathematically related keys called a key pair. 

  • Challenge-Handshake Authentication Protocol (CHAP) - A procedure that uses a three-way handshake mechanism to protect passwords. 

  • Diffie-Hellman Key Exchange – An asymmetric algorithm that generates symmetric keys simultaneously. 

  • Digital Signature Algorithm (DSA) - A federal standard for digital signatures that uses modular exponentiation and the discrete logarithm problem. 

  • Elliptic Curve Cryptography (ECC) - A public-key cryptography method that is based on groups of numbers in an elliptical curve. 

  • Extensive Authentication Protocol (EAP) - A framework that provides a standardised method to negotiate wireless authentication between wireless devices. 

Comments

Popular posts from this blog

OSA Summer 2023 Mock - Task 1, Assignment 1

OSA Assignment 1 - Task 1 GUIDE

Useful Core A Acronyms