Term
|
Definition
| encryption scheme where words and phrases in the P.T. message are replaced with words, numbers, or symbols, to create the C.T. message |
|
|
Term
|
Definition
| A method of replacing symbols in a language or message for the purpose of transmitting or storing the message using a particular method; generally, widely published and is not intended to secure information |
|
|
Term
|
Definition
|
|
Term
|
Definition
| encrypted form of the plain text message |
|
|
Term
|
Definition
| Uses the same key for encryption and decryption. The key must be shared between the communicator prior to sending enciphered messages |
|
|
Term
|
Definition
| uses different keys for encryption and decryption. These keys often take the form of key pairs where one key is published and the other key is private. |
|
|
Term
|
Definition
| any organization established, usually by a government, for the purpose of performing cryptanalysis on foreign communications of interest. |
|
|
Term
|
Definition
| a field cipher used by the Germans during World War II. The Enigma is one of the better known historical encryption machines, and it actually refers to a range of similar cipher machines |
|
|
Term
|
Definition
| German rotor stream cipher machines used by the German Army during World War II |
|
|
Term
|
Definition
| is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages |
|
|
Term
|
Definition
| device or object needed to encrypt the message, example scytale |
|
|
Term
|
Definition
| manual polyalphabetic substitution cipher system, invented in 1795 by Thomas Jefferson |
|
|
Term
|
Definition
| Cylindrical device employing a tape to scramble the letters in a message |
|
|
Term
|
Definition
| a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption. |
|
|
Term
|
Definition
| a symmetric-key algorithm for the encryption of electronic data, a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time |
|
|
Term
|
Definition
| a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. First described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. |
|
|
Term
|
Definition
| substitution in cryptography that uses a single substitution alphabet so that each plaintext letter always has the same cipher equivalent |
|
|
Term
|
Definition
| a system of substitution that mixes together a number of cipher alphabets in a cryptogram so that each plaintext letter is represented by a cipher that repeatedly changes |
|
|
Term
|
Definition
| a polyalphabetic cipher because it uses two or more cipher alphabets to encrypt the data. |
|
|
Term
|
Definition
| a pair of consecutive written units such as letters, syllables, or words |
|
|
Term
|
Definition
| a group of three consecutive written units such as letters, syllables, or words |
|
|
Term
|
Definition
| some piece of information employed by a cipher to guide the conversion of the P.T. to C.T. and vice versa |
|
|
Term
|
Definition
| the set of all possible keys that can be used to initialize it |
|
|
Term
|
Definition
| science of building new cryptosystems |
|
|
Term
|
Definition
| science of discovering weaknesses in existing cryptosystems in order to retrieve the plaintext of a message without knowing the key |
|
|
Term
|
Definition
| an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent. |
|
|
Term
|
Definition
| means the cipher should hide all the local patterns or characteristics of the plaintext language |
|
|
Term
|
Definition
| means that the cipher should mix up segments of the message so that no character remains in its original position |
|
|
Term
|
Definition
| was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II |
|
|
Term
|
Definition
| Machine used to decipher the Lorenz |
|
|
Term
|
Definition
| a word, phrase, or sentence formed from another by rearranging its letters |
|
|
Term
|
Definition
| a cipher which incorporates the message (the plaintext) into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text, or more commonly, by adding a short primer key to the front of the message. |
|
|
Term
|
Definition
| A unit of information, one hundredth of a ban |
|
|
Term
|
Definition
| a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. In other words, the same plaintext value will always result in the same ciphertext value. |
|
|
Term
|
Definition
| an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents. |
|
|
Term
|
Definition
| a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. |
|
|
Term
|
Definition
| the number of positive integers that are relatively prime to (i.e., do not contain any factor in common with) where 1 is counted as being relatively prime to all numbers. |
|
|
Term
|
Definition
| a measure of how similar a frequency distribution is to the uniform distribution. |
|
|
Term
| Linear Feedback Shift Register |
|
Definition
| shift register whose input bit is a linear function of its previous state. The most commonly used linear function of single bits is exclusive-or (XOR) |
|
|
Term
|
Definition
| is a method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher. Relies on the occasional coincidental alignment of letter groups in plaintext with the keyword, find groups of same letters of 3 or more and calculate the distance between those groups. |
|
|
Term
|
Definition
| a cryptographic hash function containing a string of digits created by a one-way hashing formula that takes an input of arbitrary length and produces a message digest that is 128 bits long. |
|
|
Term
|
Definition
| a mode of operation for a block cipher. It has some similarities to the ciphertext feedback mode in that it permits encryption of differing block sizes, but has the key difference that the output of the encryption block function is the feedback (instead of the ciphertext). |
|
|
Term
|
Definition
| a way to take data that may or may not be a multiple of the block size for a cipher and extend it out so that it is. |
|
|
Term
|
Definition
| states that if n items are put into m containers, with n > m, then at least one container must contain more than one item. |
|
|
Term
| Pretty Good Privacy (PGP) |
|
Definition
| an encryption program that provides cryptographic privacy and authentication for data communication. |
|
|
Term
|
Definition
| combines two or more ciphers processes with the intent that the resulting cipher is more secure than the individual ciphers alone |
|
|
Term
|
Definition
| an encryption technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication. |
|
|
Term
|
Definition
| gathering information through observations of operations of the underlying cipher that can leak performance characteristics |
|
|
Term
|
Definition
| A function that is easy to compute in one direction but difficult to compute in the opposite direction (finding its inverse) without special information. |
|
|
Term
|
Definition
| a symmetric key cipher operating on fixed-length groups of bits called blocks |
|
|
Term
|
Definition
| An analysis of the frequency that letters occur in a message and a simple but powerful cryptanalysis tool |
|
|
Term
|
Definition
| The largest divisible factor of two numbers |
|
|
Term
|
Definition
| An encryption method where the mapping of the permutation to the natural ordering of the alphabet denotes the key. |
|
|