Cryptography Glossary

A procedure that is carried out in sequential steps to solve a problem.
An attempt to break into a cryptosystem.
The process of verifying information including identity, ownership, or authorization.
Back Door
A cipher design fault that allows access to a system who discover the secret.
Blind Signature Scheme
Scheme that allows one party to have another party sign a message without knowing the contents.
Block Cipher
Encrypts data in blocks.
An electronic document provided by Certifying Authorities that binds information that identifies the owner with a public key.
An encryption chip developed by the US government to be used in all encrypted communications. It would allow the government to "listen in" after obtaining a warrant.
The method of making information secure.
Term for extracting information that has been encrypted.
Digital Fingerprint
Similar to digital signature.
Digital Signature
The value that provides authentication in an electronic document.
Distributed Key
A key that is divided into several parts and shared with multiple participants.
Term used to define hiding information in a secret cipher.
Expiration Date
Date when a certificate or key expires.
Data item with content that misleads the recipient into believing it came from a different source.
A string of bits that allows someone to encrypt or decrypt data.
Key Schedule
In a Block Cipher this is the algorithm that generates the subkeys.
Key Space
A collection of all the possible keys for a cryptosystem.
Life Cycle
How long a key can be used and still provide adequate security.
One Time Password-A password that can only be used once.
A key in the form of a word or group of characters that allows the user to access an area that is secure.
Plain Text
Data to be encrypted.
Random Number Generator
A device or algorithm that generates a sequence of numbers that has no set pattern.
Reusable Password
A password that can be used repeatedly.
Running Time
How long it takes for a specific algorithm to run as a function.
An arbitrary value that is attached to a password before hash authentication, that is unique to a specific user.
Secret Key
A crypto key with a symmetric algorithm that is used for both encrypting and decrypting the same data.
A computer that provides services to other computers, or a software program that provides a specific service to client software running on that computer or others n a network.
Session Key
A key that is used only one time for a single session or message and then is discarded.
The Block Cipher that is in the Clipper Chip.
An attack that copies the content of network messages to obtain information such as passwords.
The process of dividing a crypto key into two parts so that the key can't be reconstructed if an attacker intercepts one part.
Symmetric Cipher
Ciper that uses the same key to encrypt as well as to decrypt the data.
Transmission Control Protocol
Internet protocol that is used to provide a reliable connection between a server and a client.
Transport Mode
ESP mode that encrypts the data but not the original IP addresses.
Tunnel Mode
ESP mode that encrypts data and IP addresses.
Vernam Cipher
The original cipher that was developed to encrypt teletype traffic, patented in 1919.
Weakness in security that could allow an opponent to attack and penetrate a cryptosystem.
Wide Area Network
A group of host computers and sites that are connected across a wide geographic area through a network.