ch 8 & 9 vocab - Vocabulary Chapter 8 cryptography- the...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Vocabulary Chapter 8 cryptography- the process of making and using codes to secure the transmission of information encryption- the process of converting an original message into a form that is unreadable to unauthorized individuals decryption- the process of converting the ciphertext message back into plaintext so that it can be readily understood substitution cipher- substituting one value for another mono-alphabetic substitution- only uses one alphabet poly-alphabetic substitution- uses two or more alphabets Types of Ciphers: -substitution cipher -transposition cipher (permutation) - exclusive OR operation (XOR) - Vernam cipher - Running Key cipher - has function- mathematical algorithms that generate a message summary to confirm identity message authentication code (MAC)- a key-dependent, one-way hash function time-memory tradeoff attack- using a rainbow table to look up hashed passwords symmetric encryption- encryption methodologies that require the same secret key to encipher and decipher a message
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2009 for the course SRA 111 taught by Professor Santoro,gerald during the Spring '07 term at Pennsylvania State University, University Park.

Page1 / 3

ch 8 & 9 vocab - Vocabulary Chapter 8 cryptography- the...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online