Glossary of Terms (page 1)
adaptive-chosen-ciphertext - A version of the chosen-ciphertext attack where the cryptanalyst can choose ciphertexts dynamically. A Cryptanalyst can mount an attack of this type in a scenario in which he or she has free use of a piece of decryption hardware, but is unable to extract the decryption key from it.
adaptive-chosen-plaintext - A special case of the chosen-plaintext attack in which the cryptanalyst is able to choose plaintexts dynamically, and alter his or her choices base on the results of previous encryptions.
adversary - Commonly used to refer to the opponent, the enemy, or any other mischievous person that desires to compromise one's security.
AES - The Advanced Encryption Standard that will replace DES (The Data Encryption Standard) around the turn of the century.
algebraic attack - A method of cryptanalytic attack used against block ciphers that exhibit a significant amount of mathematical structure.
algorithm - A series of steps used to complete a task.
Alice - The name traditionally used for the first user of cryptography in a system: Bob's friend.
ANSI - American National Standards Institute.
API - Application Programming Interface.
attack - Either a successful or unsuccessful attempt at breaking part or all of a cryptosystem. See algebraic attack, birthday attack, brute force attack, chosen ciphertext attack, chosen plaintext attack, differential cryptanalysis, known plaintext attack, linear cryptanalysis, middleperson attack.
authentication - The action of verifying information such as identity, ownership or authorization.
biometrics - The science of using biological properties to identify individuals; for example, fingerprints, retina scan and voice recognition.
birthday attack - A brute-force attack used to find collisions. It gets its name from the surprising result that the probability of two or more people in a group of 23 sharing the same birthday is greater than 1/2.
bit - A binary digit, either 1 or 0.
blind signature scheme - Allows one party to have a second party sign a message without revealing any (or very little) information about the message to the second party.
block - A sequence of bits of fixed length; longer sequences of bits can be broken down into blocks.
block cipher - A symmetric cipher which encrypts a message by breaking it down into blocks and encrypting each block.
block cipher based MAC - MAC that is preformed by using a block cipher as a keyed compression function.
Bob - The name traditionally used for the second user of cryptography in a system; Alice's friend.
boolean expression - A mathematical expression in which all variables involved are either 0 or 1; it evaluates to either 0 or 1.
brute force attack - This attack requires trying all (or a large fraction of all) possible values till the right value is found; also called an exhaustive search.