This refers to the use of digital certificates for secure communication over the internet
What is Secure Communication?
This is the widely used standard for public key cryptography and digital certificates.
What is the Public-Key Cryptography Standards (PKCS)?
Is DES symmetric or asymmetric?
What is Symmetric
Symmetric block cipher that is intended to replace DES as the approved standard for a wide range of applications.
What is AES
This group standardized AES.
Who is NIST?
This is the process of converting an encrypted message back into its original form using the RSA algorithm
What is Decryption?
This is the process of verifying the authenticity of a digital certificate.
What is Certificate Validation?
Data is encrypted in 64-bit blocks using a
56-bit key in this algorithm
What is DEA
Year that Intel introduced AES hardware modules.
What is 2008
Half of the data block is used to modify the other half of the data block and then the halves are swapped.
What is Feistel structure?
This is the mathematical problem at the heart of the RSA algorithm.
What is the factorization of large integers?
This is the component of a PKI system responsible for generating and signing digital certificates.
What is a Certificate Issuer?
Encrypts a digital data stream one bit or one byte stream
one bit or one byte at a timeat a time
What is Stream Cipher
Three popular key lengths for AES in bits?
What is 128, 192, 256
The size matrix of the S-box for AES
What is 16x16?
This is the type of certificate used to identify an individual or organization in a PKI system.
What is an End-Entity Certificate?
This is the process of revoking a digital certificate that has been compromised or is no longer valid.
What is Certificate Revocation?
Each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements
What is Substitution
The four stages of AES?
What is Substitute bytes, Shift Rows, Mix columns, and add Round Key
AES original name.
What is Rijndael?
This is the widely used standard for secure web communications using digital certificates.
What is the Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Protocol?
This refers to the collection of certificate authorities
What is a Public Key Infrastructure (PKI)?
Seeks to make the relationship between the statistics of the
ciphertext and the value of the encryption key as complex as
possible
What is Confusion
Why is Mix columns not included in the final round of encryption and decryption?
Linear operation doesn't make it harder to decrypt
Word output in AES key expansion.
What is 44?