Term
|
Definition
If the message is captured it cannot be deciphered |
|
|
Term
|
Definition
Guarantees that the message has not been altered |
|
|
Term
|
Definition
The message is not a forgery and does actually come from whom it says |
|
|
Term
|
Definition
Attacker tries every possible key with the decryption algorithm |
|
|
Term
|
Definition
attacker has the ciphertext of several messages all using the same encryption algorithm |
|
|
Term
|
Definition
attacker has access to the ciphertext of several messages, but also knows something about the plaintext underlying that ciphertext |
|
|
Term
|
Definition
attacker chooses which data the encryption device encrypts and observes the ciphertext output |
|
|
Term
|
Definition
a known plaintext attack in which the attacker knows a portion of hte plaintext and the corresponding ciphertext |
|
|
Term
|
Definition
attacker can choose ifferent ciphertext to be decrypted and has access to the decrypted plaintext |
|
|
Term
|
Definition
In a modern cryptographic system, key generation is usually automated and not left ot users |
|
|
Term
|
Definition
Almost all cryptographic algorithms have some weak keys that should not be used |
|
|
Term
|
Definition
If a Trojan Horse program were installed on the PC an attacker could then have access to the private keys |
|
|
Term
|
Definition
Key mgmt procedures should provide a secure key exchange mechanism |
|
|
Term
Key Revocation and Destruction |
|
Definition
Notifies all interested parties tha a certain key has been compromised and should no longer be used. Erases old keys in amanner that prevents malicious attackers from recovering them |
|
|
Term
|
Definition
Exchanged between two routers supporting a VPN The key to encrypt and decrypt are the same |
|
|
Term
|
Definition
The key to encrypts and decrypt are different, but related Used in secure HTTPS applications |
|
|
Term
|
Definition
Widely used for code signing |
|
|
Term
|
Definition
Used in symmetric and assymmetric key generation, digital signatures and other types of applications |
|
|
Term
|
Definition
|
|
Term
Types of symmetrical encryption |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
I want you to be sure the information came only from me |
|
|
Term
|
Definition
I want to be sure that you are the only person who can read the file |
|
|
Term
|
Definition
I cannot deny the file came from me |
|
|