2.10 Terms and Concepts

 <  Free Open Study  >  

sender, 36

Vigen re tableau, 48

receiver, 36

Vernam cipher, 48

transmission medium, 36

book cipher, 49

interceptor, 36

transposition, 52

intruder, 36

columnar transposition, 52

encryption, 36

digram, 54

decryption, 36

trigram, 54

encode, 36

product cipher, 55

decode, 36

secure cryptographic system, 58

encipher , 36

amount of secrecy , 58

decipher, 36

error propagation, 58

cryptosystem, 36

authentication, 59

cipher, 36

key distribution, 60

plaintext, 36

key management, 60

ciphertext , 36

stream cipher, 60

key, 37

block cipher, 60

keyless cipher, 37

confusion, 62

symmetric, 37

diffusion, 62

asymmetric, 37

ciphertext-only attack, 63

cryptography, 38

known plaintext attack, 63

cryptanalyst, 38

probable plaintext attack, 63

cryptology, 38

chosen plaintext attack, 63

break an encryption, 39

chosen ciphertext attack, 64

breakable encryption, 40

Data Encryption Standard (DES), 65

substitution, 41

Data Encryption Algorithm-1, 66

transposition, 41

double DES, 67

substitution cipher, 41

triple DES, 68

monoalphabetic substitution, 41

simple substitution, 41

Advanced Encryption Standard (AES), 69

Caesar cipher, 41

Rijndael, 70

permutation, 44

cycle or round, 70

one-time pad, 47

public key, 73

private key, 73

MD4, MD5, 77

secret key, 73

SHA/SHS, 77

Rivest “Shamir “Adelman (RSA) algorithm, 75

one-way function, 77

chaining, 77

cryptographic hash function, 77

key exchange, 77

message digest, 77

digital signature, 79

hash, 77

certificate, 81

checksum, 77

certificate authority, 84

 <  Free Open Study  >  


Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net