AlgorithmA procedure that is carried out in sequential steps to solve a problem.
AttackAn attempt to break into a cryptosystem.
AuthenticationThe process of verifying information including identity, ownership, or authorization.
Back DoorA cipher design fault that allows access to a system who discover the secret.
Blind Signature SchemeScheme that allows one party to have another party sign a message without knowing the contents.
Block CipherEncrypts data in blocks.
CertificateAn electronic document provided by Certifying Authorities that binds information that identifies the owner with a public key.
ClipperAn encryption chip developed by the US government to be used in all encrypted communications. It would allow the government to "listen in" after obtaining a warrant.
CryptographyThe method of making information secure.
DecryptionTerm for extracting information that has been encrypted.
Digital Fingerprint Similar to digital signature.
Digital SignatureThe value that provides authentication in an electronic document.
Distributed KeyA key that is divided into several parts and shared with multiple participants.
EncryptionTerm used to define hiding information in a secret cipher.
Expiration DateDate when a certificate or key expires.
ForgeryData item with content that misleads the recipient into believing it came from a different source.
KeyA string of bits that allows someone to encrypt or decrypt data.
Key ScheduleIn a Block Cipher this is the algorithm that generates the subkeys.
Key SpaceA collection of all the possible keys for a cryptosystem.
Life CycleHow long a key can be used and still provide adequate security.
One Time Password-A password that can only be used once.
PasswordA key in the form of a word or group of characters that allows the user to access an area that is secure.
Plain TextData to be encrypted.
Random Number GeneratorA device or algorithm that generates a sequence of numbers that has no set pattern.
Reusable PasswordA password that can be used repeatedly.
Running TimeHow long it takes for a specific algorithm to run as a function.
SaltAn arbitrary value that is attached to a password before hash authentication, that is unique to a specific user.
Secret KeyA crypto key with a symmetric algorithm that is used for both encrypting and decrypting the same data.
ServerA computer that provides services to other computers, or a software program that provides a specific service to client software running on that computer or others n a network.
Session KeyA key that is used only one time for a single session or message and then is discarded.
SKIPJACKThe Block Cipher that is in the Clipper Chip.
SniffingAn attack that copies the content of network messages to obtain information such as passwords.
SplittingThe process of dividing a crypto key into two parts so that the key can't be reconstructed if an attacker intercepts one part.
Symmetric CipherCiper that uses the same key to encrypt as well as to decrypt the data.
Transmission Control ProtocolInternet protocol that is used to provide a reliable connection between a server and a client.
Transport ModeESP mode that encrypts the data but not the original IP addresses.
Tunnel ModeESP mode that encrypts data and IP addresses.
Vernam CipherThe original cipher that was developed to encrypt teletype traffic, patented in 1919.
VulnerabilityWeakness in security that could allow an opponent to attack and penetrate a cryptosystem.
Wide Area NetworkA group of host computers and sites that are connected across a wide geographic area through a network.