Chapter 4 Flashcards
(32 cards)
Public key
Used for encryption and validation of digital signatures
Private key
Used for decryption and digital signatures
Encryption
Changing plaintext to cyphertext
Level
The scope or layer at which encryption is applied
Asymmetric encryption
Uses two keys, a private key and a public key
Symmetric encryption
Uses one key and encrypts a large amount of data using block cipher
Key exchange
Delivers cryptographic keys from a sender to receiver
Key length
The length of cryptographic keys impacts resistance against attacks
Tools
The hardware and software solutions applied to encryption
Trusted platform module (TPM)
A TPM ensures the integrity of the system boot process
Hardware security module (HSM)
A highly secure environment for the storage of cryptographic keys
Key management system
Software solution used to create, manage and store cryptographic keys
Secure enclave
Used to protect user data, biometric information and cryptographic keys from potential software-based attacks
Obfuscation
Deliberately obscuring code that makes it difficult for the attacker to understand it
Steganography
Hiding data inside data, image or audio files
Tokenization
Transforming sensitive data into unique tokens that hold no inherent value
Data masking
Disguising sensitive data by replacing original values with fictitious ones
Hashing
Used for data integrity and password security
Salting
Adding random values to a credential
Digital signatures
Ensures the authenticity, integrity and non-repudiation of a document
Key stretching
A cryptographic technique designed to transform a password into a longer, more complex key
Blockchain
A decentralized digital ledger for secure transaction
Open public ledger
A shared transparent record accessible to all for verifying transactions
Certificates
Mechanisms that underpin secure digital interactions