This was the first example of cryptography over 4000 years ago
Translation
Data which resides in a permanent location awaiting access
Data at rest
The system must not be required to be secret, and it must be able to fall into the hands of an enemy without inconvenience
The Kerckhoff Principle
Least secure DES mode
Electronic Codebook Mode
A digital database ledger that is distributed among the nodes of a peer-to-peer network
Blockchain
Encryption method that involves shifting the letters of the alphabet by a set amount
Caesar cipher
Data that is susceptible to eavesdropping
Data in motion
Primarily used for bulk encryption (archiving), relies on a shared key for encrypting/decrypting
Symmetric Key Algorithms
DES mode that increments the IV for each operation
Counter Mode
Layers of encryption prevent nodes in the relay chain from reading anything other than info needed to accept and forward the traffic
Perfect forward secrecy
Encryption method using a Vigenere Table and a key word
Polyalphabetic Substitution
An encrypted message digests, created upon transmission
Digital signature
Established the first standard key length of 56-bits
Data Encryption Standard
Keys can be split in half, so that two people must collaborate to re-create the entire key
Split knowledge
Enables complex mathematical operations to be performed on encrypted data without compromising the encryption
Homomorphic encryption
nafjre vf cnffjbeq
Password
An authentication method that involves asking a question
Challenge-response
Can provide integrity, authentication, and nonrepudiation
Asymmetric Key Algorithms
Symmetric key generation used when no physical exchange or public key infrastructure is available
Dillie-Hellman Algorithm
The counterpart in quantum computing to the binary digit or bit of classical computing
Qubit
A way to authenticate images
Water marking
The study of methods to defeat codes and ciphers
Cryptanalysis
The result of using a hash function on data
Message digest
The creation, distribution, storage, destruction, recovery, and escrow of secret keys
Key Management Practices
An attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted version
Known-plaintext Attack