AND ENGINEERING QUESTIONS WITH COMPLETE SOLUTIONS
Algorithm
A mathematical function that is used in the encryption and decryption processes.
Asymmetric
Not identical on both sides. In cryptography,
key pairs are used, one to encrypt, the other
to decrypt.
Availability
Ensuring timely and reliable access to and use of information by authorized users.
Certificate authority (CA)
An entity trusted by one or more users as an authority in a network that issues, revokes,
and manages digital certificates to bind
individuals and entities to their public keys.
CIA/AIC Triad
Security model with the three security concepts of confidentiality, integrity, and
availability make up the CIA Triad. It is also sometimes referred to as the AIC Triad.
Ciphertext
The altered form of a plaintext message, so as to be unreadable for anyone except the
intended recipients. Something that has been turned into a secret.
Confidentiality
Preserving authorized restrictions on information access and disclosure, including
means for protecting personal privacy and proprietary information.
Confusion
Provided by mixing (changing) the key values used during the repeated rounds of
encryption. When the key is modified for each round, it provides added complexity that
the attacker would encounter.