Cryptography and Network Security term
Definition
Key stretching {Definition} A technique used to increase the computational effort
required to derive keys from a password.
Bcrypt {Definition} A cryptographic algorithm that generates hashes from passwords
using the Blowfish cipher.
PBKDF2 {Definition} A key derivation function that is part of the RSA public key
cryptography standards.
Elliptic Curve Cryptography (ECC) {Definition} A public-key cryptographic system
based on the mathematics of elliptic curves.
Perfect Forward Secrecy (PFS) {Definition} A property that ensures the confidentiality
of past communication sessions even if the long-term secret key is compromised.
Ephemeral Key {Definition} An asymmetric key that is used for only one session and
then discarded.
Static Key {Definition} A key that is used for a longer duration and multiple sessions.
Session Key {Definition} An asymmetric key that is used for encryption and decryption
in a single session.
ECB (Electronic Codebook) {Definition} A block cipher mode that is considered the
weakest mode and was used in the Data Encryption Standard (DES).
Homomorphic Encryption {Definition} A type of encryption where encrypted data can
still be processed without being decrypted.
EFS (Encrypting File System) {Definition} A file-level encryption feature within Microsoft
Windows operating systems.
FDE (Full Disk Encryption) {Definition} A method of encrypting an entire storage device,
such as a hard drive or SSD.
Advanced Encryption Standard (AES) {Definition} A widely used symmetric encryption
algorithm that replaced the Data Encryption Standard (DES).
, Triple Data Encryption Standard (3DES) {Definition} A variant of the Data Encryption
Standard (DES) that applies the DES algorithm three times for increased security.
Blowfish {Definition} A symmetric key block cipher that operates on variable-length
blocks and is known for its strong security.
Twofish {Definition} A symmetric key block cipher that operates on 128-bit blocks and is
considered secure and efficient.
RSA (Rivest-Shamir-Adleman) {Definition} A widely used asymmetric encryption
algorithm that is based on the difficulty of factoring large prime numbers.
Diffie-Hellman (DHE) {Definition} A key exchange algorithm used to establish a shared
secret key over an insecure communication channel.
Digital Signature Algorithm (DSA) {Definition} An algorithm used for creating and
verifying digital signatures.
PGP (Pretty Good Privacy) {Definition} A software program used for signing,
encrypting, and decrypting texts, emails, and files.
CBC (Cipher Block Chaining) {Definition} A block cipher mode that combines the
plaintext with the previous ciphertext block to provide confidentiality and integrity.
CTR (Counter) {Definition} A stream cipher that encrypts successive values of a
counter to generate the keystream.
GCM (Galois/Counter Mode) {Definition} An encryption mode that combines Counter
mode with Galois authentication to provide both confidentiality and integrity.
Serpent {Definition} A symmetric key block cipher that operates on 128-bit blocks and
is known for its strong security.
Camellia {Definition} A symmetric key block cipher that operates on 128-bit blocks and
is used in various cryptographic applications.
IDEA (International Data Encryption Algorithm) {Definition} A symmetric key block
cipher that operates on 64-bit blocks and is used in various applications.
RC4 {Definition} A stream cipher known for its simplicity and speed, but is no longer
considered secure.
ChaCha20 {Definition} A stream cipher widely used in applications such as Transport
Layer Security (TLS) for secure communication.
Definition
Key stretching {Definition} A technique used to increase the computational effort
required to derive keys from a password.
Bcrypt {Definition} A cryptographic algorithm that generates hashes from passwords
using the Blowfish cipher.
PBKDF2 {Definition} A key derivation function that is part of the RSA public key
cryptography standards.
Elliptic Curve Cryptography (ECC) {Definition} A public-key cryptographic system
based on the mathematics of elliptic curves.
Perfect Forward Secrecy (PFS) {Definition} A property that ensures the confidentiality
of past communication sessions even if the long-term secret key is compromised.
Ephemeral Key {Definition} An asymmetric key that is used for only one session and
then discarded.
Static Key {Definition} A key that is used for a longer duration and multiple sessions.
Session Key {Definition} An asymmetric key that is used for encryption and decryption
in a single session.
ECB (Electronic Codebook) {Definition} A block cipher mode that is considered the
weakest mode and was used in the Data Encryption Standard (DES).
Homomorphic Encryption {Definition} A type of encryption where encrypted data can
still be processed without being decrypted.
EFS (Encrypting File System) {Definition} A file-level encryption feature within Microsoft
Windows operating systems.
FDE (Full Disk Encryption) {Definition} A method of encrypting an entire storage device,
such as a hard drive or SSD.
Advanced Encryption Standard (AES) {Definition} A widely used symmetric encryption
algorithm that replaced the Data Encryption Standard (DES).
, Triple Data Encryption Standard (3DES) {Definition} A variant of the Data Encryption
Standard (DES) that applies the DES algorithm three times for increased security.
Blowfish {Definition} A symmetric key block cipher that operates on variable-length
blocks and is known for its strong security.
Twofish {Definition} A symmetric key block cipher that operates on 128-bit blocks and is
considered secure and efficient.
RSA (Rivest-Shamir-Adleman) {Definition} A widely used asymmetric encryption
algorithm that is based on the difficulty of factoring large prime numbers.
Diffie-Hellman (DHE) {Definition} A key exchange algorithm used to establish a shared
secret key over an insecure communication channel.
Digital Signature Algorithm (DSA) {Definition} An algorithm used for creating and
verifying digital signatures.
PGP (Pretty Good Privacy) {Definition} A software program used for signing,
encrypting, and decrypting texts, emails, and files.
CBC (Cipher Block Chaining) {Definition} A block cipher mode that combines the
plaintext with the previous ciphertext block to provide confidentiality and integrity.
CTR (Counter) {Definition} A stream cipher that encrypts successive values of a
counter to generate the keystream.
GCM (Galois/Counter Mode) {Definition} An encryption mode that combines Counter
mode with Galois authentication to provide both confidentiality and integrity.
Serpent {Definition} A symmetric key block cipher that operates on 128-bit blocks and
is known for its strong security.
Camellia {Definition} A symmetric key block cipher that operates on 128-bit blocks and
is used in various cryptographic applications.
IDEA (International Data Encryption Algorithm) {Definition} A symmetric key block
cipher that operates on 64-bit blocks and is used in various applications.
RC4 {Definition} A stream cipher known for its simplicity and speed, but is no longer
considered secure.
ChaCha20 {Definition} A stream cipher widely used in applications such as Transport
Layer Security (TLS) for secure communication.