Zzz 11-14
Plaintext
Cleartext
Opentext
Ciphertext
Confidentiality
Stop loss
Integrity
Authenticity
In data that is used to describe the content or structure of the actual data
In the directory structure of the file system
In the file header fields that describe the file
In areas that contain the content data itself
Repudiation
Integrity
Nonrepudiation
Availability
Private key cryptography
Cipherkey cryptography
Public/private key cryptography
Public key cryptography
Stream
Hash
Algorithm
Key
Collisions should be rare
The results of a hash function should not be reversed
The hash should always be the same fixed size
A message cannot be produced from a predefined hash
Bank automatic teller machine (ATM)
Encrypting and decrypting email attachments
Verifying a user password entered on a Linux system
Determining the integrity of a message
Key_hash
WEP
MDRIPE
Hashed Message Authentication Code (HMAC)
Authenticity
Confidentiality
Integrity
Availability
DES
AES
RC4
RIPEMD
Advanced Encryption Standard
Data Encryption Standard
Triple Data Encryption Standard
Rivest Cipher (RC) 1
Alice’s private key
Alice’s public key
Bob’s public key
Bob’s private key
Prove the integrity of the message
Verify the receiver
Verify the sender
Enforce nonrepudiation
MEC-2
RSA
MD-17
SHA-2
EFS
Quantum computing
ECC
RSA
NTRUEncrypt
ECC
RC4
SHA-512
Allows the user to boot a corrupted disk and repair it
Is only available on Windows computers running BitLocker
Includes a pseudorandom number generator (PRNG)
Provides cryptographic services in hardware instead of software
Trusted Platform Module (TPM)
Self-encrypting hard disk drives (HDDs)
Encrypted hardware-based USB devices
Hardware Security Module (HSM)
Is weaker than NTLMv2
Is part of BitLocker
Is required to be present when using TPM
Is identical to MD-4
Digital signature
Encrypted signature
Hash
Digital certificate
A private key with a digital signature
the user’s identity with their public key
A user’s private key with public key
A user’s public key with their private key
To verify the authenticity of the Registration Authorizer
To verify the identity of clients and servers on the Web
To encrypt messages for secure email communications
To encrypt channels to provide secure communications between clients and servers
Certificate Signatory (CS)
Signature Authority (SA)
Digital Signer (DS)
Certificate Authority (CA)
Digital Signature Approval List (DSAP)
Digital Signature Permitted Authorization (DSPA)
Authorized Digital Signature (ADS)
Certificate Repository (CR)
Wait!
Here's an interesting quiz for you.