You've just added this product to the cart:

Cryptography Glossary

Cryptography Glossary

Algorithm: A procedure that is carried out in sequential steps to solve a problem.

Attack: An attempt to break into a cryptosystem.

Authentication: The process of verifying information including identity, ownership, or authorization.

Back Door: A cipher design fault that allows access to a system who discover the secret.

Blind Signature Scheme: Scheme that allows one party to have another party sign a message without knowing the contents.

Block Cipher: Encrypts data in blocks.

Certificate: An electronic document provided by Certifying Authorities that binds information that identifies the owner with a public key.

Clipper: An encryption chip developed by the US government to be used in all encrypted communications. It would allow the government to “listen in” after obtaining a warrant.

Cryptography: The method of making information secure.

Decryption: Term for extracting information that has been encrypted.

Digital Fingerprint: Similar to digital signature.

Digital Signature: The value that provides authentication in an electronic document.

Distributed Key: A key that is divided into several parts and shared with multiple participants.

Encryption: Term used to define hiding information in a secret cipher.

Expiration Date: Date when a certificate or key expires.

Forgery: Data item with content that misleads the recipient into believing it came from a different source.

Key: A string of bits that allows someone to encrypt or decrypt data.

Key Schedule: In a Block Cipher this is the algorithm that generates the subkeys.

Key Space: A collection of all the possible keys for a cryptosystem.

Life Cycle: How long a key can be used and still provide adequate security.

One Time Password: A password that can only be used once.

Password: A key in the form of a word or group of characters that allows the user to access an area that is secure.

Plain Text: Data to be encrypted.

Random Number Generator: A device or algorithm that generates a sequence of numbers that has no set pattern.

Reusable Password: A password that can be used repeatedly.

Running Time: How long it takes for a specific algorithm to run as a function.

Salt: An arbitrary value that is attached to a password before hash authentication, that is unique to a specific user.

Secret Key: A crypto key with a symmetric algorithm that is used for both encrypting and decrypting the same data.

Server: A computer that provides services to other computers, or a software program that provides a specific service to client software running on that computer or others n a network.

Session Key: A key that is used only one time for a single session or message and then is discarded.

SKIPJACK: The Block Cipher that is in the Clipper Chip.

Sniffing: An attack that copies the content of network messages to obtain information such as passwords.

Splitting: The process of dividing a crypto key into two parts so that the key can’t be reconstructed if an attacker intercepts one part.

Symmetric Cipher: Ciper that uses the same key to encrypt as well as to decrypt the data.

Transmission Control Protocol: Internet protocol that is used to provide a reliable connection between a server and a client.

Transport Mode: ESP mode that encrypts the data but not the original IP addresses.

Tunnel Mode: ESP mode that encrypts data and IP addresses.

Vernam Cipher: The original cipher that was developed to encrypt teletype traffic, patented in 1919.

Vulnerability: Weakness in security that could allow an opponent to attack and penetrate a cryptosystem.

Wide Area Network: A group of host computers and sites that are connected across a wide geographic area through a network.