Definition of Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

authentication, authorization, certificate authority (CA), checksum, ciphertext, collision, cryptography, cryptographic hash, digital signature, Digital Signature Algorithm (DSA), HMAC, message, Message Digest 5 (MD5), National Institute of Standards and Technology (NIST), private key, public key, Public Key Infrastructure (PKI), rainbow table, RSA, salt, SHA-1

This chapter covers the following subjects:

Understanding asymmetric algorithms: This section explores asymmetric encryption and looks at how this is used in a Public Key Infrastructure (PKI). It also examines the features and capabilities of RSA, as well as its history. This section concludes by delving into the Diffie-Hellman algorithm and how it is used for key exchange.

Working with a PKI: This section examines the principles behind a PKI and discusses the attempts at standardization in this area. It also covers the role of certificate authorities (CA) in support of the PKI and examines the various topologies in which they may be used.

0 0

Post a comment