Glossary of Terms (page 1)

adaptive-chosen-ciphertext - A version of the chosen-ciphertext attack where the cryptanalyst can choose ciphertexts dynamically. A Cryptanalyst can mount an attack of this type in a scenario in which he or she has free use of a piece of decryption hardware, but is unable to extract the decryption key from it.

adaptive-chosen-plaintext - A special case of the chosen-plaintext attack in which the cryptanalyst is able to choose plaintexts dynamically, and alter his or her choices base on the results of previous encryptions.

adversary - Commonly used to refer to the opponent, the enemy, or any other mischievous person that desires to compromise one's security.

AES - The Advanced Encryption Standard that will replace DES (The Data Encryption Standard) around the turn of the century.

algebraic attack - A method of cryptanalytic attack used against block ciphers that exhibit a significant amount of mathematical structure.

algorithm - A series of steps used to complete a task.

Alice - The name traditionally used for the first user of cryptography in a system: Bob's friend.

ANSI - American National Standards Institute.

API - Application Programming Interface.

attack - Either a successful or unsuccessful attempt at breaking part or all of a cryptosystem. See algebraic attack, birthday attack, brute force attack, chosen ciphertext attack, chosen plaintext attack, differential cryptanalysis, known plaintext attack, linear cryptanalysis, middleperson attack.

authentication - The action of verifying information such as identity, ownership or authorization.

biometrics - The science of using biological properties to identify individuals; for example, fingerprints, retina scan and voice recognition.

birthday attack - A brute-force attack used to find collisions. It gets its name from the surprising result that the probability of two or more people in a group of 23 sharing the same birthday is greater than 1/2.

bit - A binary digit, either 1 or 0.

blind signature scheme - Allows one party to have a second party sign a message without revealing any (or very little) information about the message to the second party.

block - A sequence of bits of fixed length; longer sequences of bits can be broken down into blocks.

block cipher - A symmetric cipher which encrypts a message by breaking it down into blocks and encrypting each block.

block cipher based MAC - MAC that is preformed by using a block cipher as a keyed compression function.

Bob - The name traditionally used for the second user of cryptography in a system; Alice's friend.

boolean expression - A mathematical expression in which all variables involved are either 0 or 1; it evaluates to either 0 or 1.

brute force attack - This attack requires trying all (or a large fraction of all) possible values till the right value is found; also called an exhaustive search.

BACK   |   1    |   2   |   3    |   4   |   5   |   6   |    7   |   FORWARD      HOME