Shared Flashcard Set

Details

Cryptography Concepts
Certified Ethical Hacker - CEHv10: Cryptography Concepts
20
Computer Science
Post-Graduate
04/09/2025

Additional Computer Science Flashcards

 


 

Cards

Term
Key clustering:
Definition
different encryption keys generate the same ciphertext from the same plaintext message.
Term
Synchronous:
Definition
encryption or decryption request is performed immediately.
Term
Asynchronous:
Definition
Encrypt/Decrypt requests are processed in queues.
Term
Hash function:
Definition
a one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value.
Term
Variable data input:
Definition
Variable data input (of any size) + hashing algorithm = fixed bit stream output (hash value)

* MD5 = 128 bits
* SHA1 = 160 bits.
Term
Digital signatures:
Definition
provide authentication of a sender and integrity of a sender's message. A message is input into a hash function. Then the hash value is encrypted using the private key of the sender. the result of these two steps yields a digital signature.
Term
Symmetric:
Definition
a single key used to encrypt and to decrypt.
Term
Asymmetric:
Definition
two different but mathematically related keys are used where one key is used to decrypt
Term
Digital Certificate:
Definition
used to identify the certificate holder when conducting electronic transactions - type of certificates currently used = x.509 v3
Term
Certificate authority (CA):
Definition
an entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates
Term
Root CA:
Definition
only issues certificates to Subordinate CA's
Term
Subordinate CA:
Definition
issues certificates to users + computers on behalf of the Root CA
Term
Registration authority (RA):
Definition
responsible for the accuracy of the information contained in a certificate request. The RA is also expected to perform user validation before issuing a certificate request
Term
Cryptosystem:
Definition
This represents the entire cryptographic operation. This includes the algorithm, key, and key management functions
Term
key or Cryptovariable:
Definition
The input that controls the operation of the cryptographic algorithm
Term
Cryptanalysis:
Definition
study of techniques for attempting to defeat cryptographic techniques and information security services
Term
Cryptology:
Definition
the science that deals with hidden, disguised, or encrypted communications
Term
Collision:
Definition
occurs when a hash function generates the same output for different inputs
Term
Key space:
Definition
represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password
Term
Work factor:
Definition
the time and effort required to break a protective measure
Supporting users have an ad free experience!