Term
|
Definition
different encryption keys generate the same ciphertext from the same plaintext message. |
|
|
Term
|
Definition
encryption or decryption request is performed immediately. |
|
|
Term
|
Definition
Encrypt/Decrypt requests are processed in queues. |
|
|
Term
|
Definition
a one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value. |
|
|
Term
|
Definition
Variable data input (of any size) + hashing algorithm = fixed bit stream output (hash value)
* MD5 = 128 bits * SHA1 = 160 bits. |
|
|
Term
|
Definition
provide authentication of a sender and integrity of a sender's message. A message is input into a hash function. Then the hash value is encrypted using the private key of the sender. the result of these two steps yields a digital signature. |
|
|
Term
|
Definition
a single key used to encrypt and to decrypt. |
|
|
Term
|
Definition
two different but mathematically related keys are used where one key is used to decrypt |
|
|
Term
|
Definition
used to identify the certificate holder when conducting electronic transactions - type of certificates currently used = x.509 v3 |
|
|
Term
Certificate authority (CA): |
|
Definition
an entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates |
|
|
Term
|
Definition
only issues certificates to Subordinate CA's |
|
|
Term
|
Definition
issues certificates to users + computers on behalf of the Root CA |
|
|
Term
Registration authority (RA): |
|
Definition
responsible for the accuracy of the information contained in a certificate request. The RA is also expected to perform user validation before issuing a certificate request |
|
|
Term
|
Definition
This represents the entire cryptographic operation. This includes the algorithm, key, and key management functions |
|
|
Term
|
Definition
The input that controls the operation of the cryptographic algorithm |
|
|
Term
|
Definition
study of techniques for attempting to defeat cryptographic techniques and information security services |
|
|
Term
|
Definition
the science that deals with hidden, disguised, or encrypted communications |
|
|
Term
|
Definition
occurs when a hash function generates the same output for different inputs |
|
|
Term
|
Definition
represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password |
|
|
Term
|
Definition
the time and effort required to break a protective measure |
|
|