sender, 36 | Vigen re tableau, 48 | receiver, 36 | Vernam cipher, 48 | transmission medium, 36 | book cipher, 49 | interceptor, 36 | transposition, 52 | intruder, 36 | columnar transposition, 52 | encryption, 36 | digram, 54 | decryption, 36 | trigram, 54 | encode, 36 | product cipher, 55 | decode, 36 | secure cryptographic system, 58 | encipher , 36 | amount of secrecy , 58 | decipher, 36 | error propagation, 58 | cryptosystem, 36 | authentication, 59 | cipher, 36 | key distribution, 60 | plaintext, 36 | key management, 60 | ciphertext , 36 | stream cipher, 60 | key, 37 | block cipher, 60 | keyless cipher, 37 | confusion, 62 | symmetric, 37 | diffusion, 62 | asymmetric, 37 | ciphertext-only attack, 63 | cryptography, 38 | known plaintext attack, 63 | cryptanalyst, 38 | probable plaintext attack, 63 | cryptology, 38 | chosen plaintext attack, 63 | break an encryption, 39 | chosen ciphertext attack, 64 | breakable encryption, 40 | Data Encryption Standard (DES), 65 | substitution, 41 | Data Encryption Algorithm-1, 66 | transposition, 41 | double DES, 67 | substitution cipher, 41 | triple DES, 68 | monoalphabetic substitution, 41 simple substitution, 41 | Advanced Encryption Standard (AES), 69 | Caesar cipher, 41 | Rijndael, 70 | permutation, 44 | cycle or round, 70 | one-time pad, 47 | public key, 73 | private key, 73 | MD4, MD5, 77 | secret key, 73 | SHA/SHS, 77 | Rivest “Shamir “Adelman (RSA) algorithm, 75 | one-way function, 77 chaining, 77 | cryptographic hash function, 77 | key exchange, 77 | message digest, 77 | digital signature, 79 | hash, 77 | certificate, 81 | checksum, 77 | certificate authority, 84 | |