Security in Computing, 4th Edition

 <  Free Open Study  >  

sender, 36

Vigen re tableau, 48

receiver, 36

Vernam cipher, 48

transmission medium, 36

book cipher, 49

interceptor, 36

transposition, 52

intruder, 36

columnar transposition, 52

encryption, 36

digram, 54

decryption, 36

trigram, 54

encode, 36

product cipher, 55

decode, 36

secure cryptographic system, 58

encipher , 36

amount of secrecy , 58

decipher, 36

error propagation, 58

cryptosystem, 36

authentication, 59

cipher, 36

key distribution, 60

plaintext, 36

key management, 60

ciphertext , 36

stream cipher, 60

key, 37

block cipher, 60

keyless cipher, 37

confusion, 62

symmetric, 37

diffusion, 62

asymmetric, 37

ciphertext-only attack, 63

cryptography, 38

known plaintext attack, 63

cryptanalyst, 38

probable plaintext attack, 63

cryptology, 38

chosen plaintext attack, 63

break an encryption, 39

chosen ciphertext attack, 64

breakable encryption, 40

Data Encryption Standard (DES), 65

substitution, 41

Data Encryption Algorithm-1, 66

transposition, 41

double DES, 67

substitution cipher, 41

triple DES, 68

monoalphabetic substitution, 41

simple substitution, 41

Advanced Encryption Standard (AES), 69

Caesar cipher, 41

Rijndael, 70

permutation, 44

cycle or round, 70

one-time pad, 47

public key, 73

private key, 73

MD4, MD5, 77

secret key, 73

SHA/SHS, 77

Rivest “Shamir “Adelman (RSA) algorithm, 75

one-way function, 77

chaining, 77

cryptographic hash function, 77

key exchange, 77

message digest, 77

digital signature, 79

hash, 77

certificate, 81

checksum, 77

certificate authority, 84

 <  Free Open Study  >  

Категории