Term
|
Definition
| The process of converting plaintext into scrambled output called ciphertext. |
|
|
Term
|
Definition
| Mathematical method to convert plaintext into ciphertext. |
|
|
Term
|
Definition
| Symmetric-key encryption algorithm that encrypts data in fixed-size blocks by breaking the data into chunks for processing. |
|
|
Term
|
Definition
| Symmetric-key encryption algorithm that encrypts data bit by bit or byte by byte, providing continuous encryption and decryption of data streams. |
|
|
Term
|
Definition
| Encrypted network channels |
|
|
Term
|
Definition
| An encryption method using two mathematically aligned keys called a key pair (public/private keys) for encryption and decryption. |
|
|
Term
|
Definition
| An encryption method using a single key for encryption and decryption. |
|
|
Term
| Shared key or preshared key (including passwords) |
|
Definition
| A cryptographic key that is used for both encryption and decryption, and it must be kept confidential between authorized parties to maintain the security of encrypted communications or data. |
|
|
Term
|
Definition
| A mathematical formula to perform encryption, decryption and other security-centric operations. |
|
|
Term
|
Definition
| Is the secure process of sharing cryptographic keys between parties to enable encrypted communication. |
|
|
Term
|
Definition
| The size of the cryptographic key; larger keys are potentially more secure than shorter key lengths, however, longer keys require more processing power. |
|
|
Term
|
Definition
| Strengthens the resiliency of a cryptographic key to brute force attacks by applying a hash function or block cipher to the key repeatedly, increasing its length and complexity and making it more resistant to attacks like brute force. |
|
|
Term
|
Definition
| Adding a extra piece of data to a password before being run through a hashing algorithm. |
|
|
Term
| Trusted Platform Module (TPM) |
|
Definition
| Hardware-based security component that stores cryptographic keys, certificates, and sensitive data, and secure storage for credentials and encryption keys. |
|
|
Term
| Hardware security module or (HSM) |
|
Definition
| A dedicated hardware device or appliance that provides secure key storage, management, and cryptographic operations. |
|
|
Term
|
Definition
| A trusted and isolated environment within a system's hardware or software that protects sensitive data and cryptographic operations. |
|
|