Please enable JavaScript to use CodeHS

Cyber Glossary

Flashcards

Course:

Module:

Lesson:

Search:

Symmetric Encryption General

The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)

Asymmetric Encryption General

One key encrypts, a different key decrypts.

Public Key Encryption General

Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.

Modulo Operation General

Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2

key exchange General

A method in cryptography by which keys (public or private) are exchanged between two parties.

Diffie-Hellman key exchange General

One of the first asymmetric key implementations and was responsible for securing the exchange of keys.

man-in-the-middle attack General

Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.

RSA encryption General

The first widely used asymmetric algorithm used for both signing and encryption.

Digest General

The output from any input that has been processed through a hashing algorithm / function.

Hash Functions or Hashing General

The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message’s contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no “keys” in hashing functions.

Collisions General

whenever 2 inputs map to the same output.

Reverse-engineerable General

whenever you can work backwards through an algorithm (like a Caesar cipher)

SSL certificate General

A small data file that digitally binds a public cryptographic key to an organization.

single SSL certificate General

Will secure one domain or subdomain.

wildcard SSL certificate General

Will secure one domain and an unlimited number of its subdomains.

multi-domain SSL certificate General

Will secure multiple domains.

root certificate General

Belongs to the Certificate Authority.

intermediate certificate General

Acts as a “middle-man” between the root certificate and the server certificate.

server certificate General

Issued to the domain.

stapling General

Allows a server to validate their own SSL certificate by bundling a time-stamped response signed by the certificate authority.

certificate pinning General

The process of associating a host with their expected certificate or public key.