Cryptographic Solutions Flashcards
(90 cards)
Practice & Study of writing & solving codes to hide the true meaning of the information.
Cryptography
Process of converting ordinary information (plain text) into an unintelligible form (cipher text).
Encryption
Inactive data that is being archived.
Data at Rest
Data undergoing a current constant state of change.
Data in Use
Data that moves across the network, resides inside RAM, or moves to & from the processor.
Data in Transit
An algorithm that performs the encryption or decryption.
Cipher
A mathematical function (formula) that defines how to encrypt or decrypt something.
Algorithm
Where encryption strength comes from. Its length is proportional to the level of security it provides. The essential piece of information that determines the output of a cipher.
The Key
Use the same key (single key), for both encryption & decryption. Encryption algorithm in which both the sender & the receiver must know the same shared secret using a privately held key.
Symmetric Algorithms
(Private Key)
Use a pair of keys, (two), a public key for encryption & a private key for decryption. Encryption algorithm where different keys are used to encrypt & decrypt the data. Does not require a shared secret key, often referred to as public key cryptography since their key is considered to be freely & openly available to the public.
Asymmetric Algorithms
(Public Key)
The practice of hiding secret data within ordinary, non-secret files or messages to avoid detection. Derived from Greek words meaning “covered writing,” and it is all about concealing a message within another so that the very existence of the message is hidden.
Steganography
Process of disguising original data to protect sensitive information while maintaining its authenticity and usability.
Data Masking/Data Obfuscation
A transformative technique in data protection that involves substituting sensitive data elements with non-sensitive equivalents called tokens which have no meaningful value.
Tokenization
Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption.
Hybrid Implementation
Utilizes a key stream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext.
Stream Cipher
Breaks the input into fixed-length blocks of data & performs the encryption on each block.
Block Cipher
Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create cipher text using an effective key strength of only 56-bits.
Data Encryption Standard (DES) -Symmetric
Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plain text into cipher text in order to increase the strength of DES
Triple DES (3DES)
Symmetric
Symmetric block Cipher, which uses 64-bit blocks to encrypt plain text into cipher text
International Data Encryption Algorithm (IDEA)
Symmetric block Cipher that uses 128-bit, 192-bit, or 256-bit blocks & a matching encryption key size to encrypt plain text into cipher text.
Advanced Encryption Standard (AES)
Symmetric block Cipher that uses 64-bit blocks & a variable length encryption key to encrypt plain text into cipher text.
Blowfish
Provides the ability to use 128-bit blocks in its encryption algorithm & uses 128-bit, 192-bit, or 256-bit encryption keys.
Twofish
Created by Ron Rivest, a cryptographer who’s created six algorithms under the name RC which stands for the Rivest Cipher.
RC Cipher Suite
Symmetric stream Cipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP
Rivest Cipher (RC4)
Stream Cipher