54 relations: Abraham Sinkov, Active defense, Automated teller machine, Bart Preneel, Bluetooth, Brute-force attack, Cipher, Ciphertext, Ciphertext stealing, Cold boot attack, Computer network, Computer Security Institute, Copy protection, Crypto-shredding, Cryptography, Cyberspace Electronic Security Act, Data erasure, David Kahn (writer), Digital rights management, Digital signature, Disk encryption, E-commerce, Eavesdropping, Encryption software, Export of cryptography, Geo-blocking, Hardware-based encryption, Insider threat, IOS, Key (cryptography), Key management, Message authentication code, Mobile phone, Oded Goldreich, Phil Zimmermann, Plaintext, Pretty Good Privacy, Pseudorandomness, Public-key cryptography, Ransomware, Reverse engineering, Rotor machine, Substitution cipher, Symantec, Symmetric-key algorithm, Tahoe-LAFS, Television encryption, Tempest (codename), Tokenization (data security), Traffic analysis, ..., Trojan horse (computing), USB flash drive, Wireless intercom, Wireless microphone. Expand index (4 more) » « Shrink index
Abraham "Abe" Sinkov (August 22, 1907 – January 19, 1998) was a US cryptanalyst.
Active defense can refer to a defensive strategy in the military or cybersecurity arena.
An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, transfer funds, or obtaining account information, at any time and without the need for direct interaction with bank staff.
Bart Preneel (born 15 October 1963) is a Flemish cryptographer and cryptanalyst.
Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.
In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity.
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer.
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons.
Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys.
Cryptography or cryptology (from κρυπτός|translit.
The Cyberspace Electronic Security Act of 1999 (CESA) is a bill proposed by the Clinton administration during the 106th United States Congress that enables the government to harvest keys used in encryption.
Data erasure (sometimes referred to as data clearing or data wiping) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device.
David Kahn (b. February 7, 1930*) is a US historian, journalist and writer.
Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.
A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
E-commerce is the activity of buying or selling of products on online services or over the Internet.
Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent.
Encryption software is software that uses cryptography to prevent unauthorized access to digital information.
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.
Geo-blocking or geoblocking is technology that restricts access to Internet content based upon the user's geographical location.
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption.
An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware.
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
Key management refers to management of cryptographic keys in a cryptosystem.
In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.
A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
Oded Goldreich (עודד גולדרייך; b. 1957) is a professor of Computer Science at the Faculty of Mathematics and Computer Science of Weizmann Institute of Science, Israel.
Philip R. "Phil" Zimmermann, Jr. (born February 12, 1954) is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world.
In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
A pseudorandom process is a process that appears to be random but is not.
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.
In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages.
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.
Symantec Corporation (commonly known as Symantec) is an American software company headquartered in Mountain View, California, United States.
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Tahoe-LAFS (Tahoe Least-Authority File Store) is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system.
Television encryption, often referred to as "scrambling", is encryption used to control access to pay television services, usually cable or satellite television services.
TEMPEST is a National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.
Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
A USB flash drive, also variously known as a thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key (after the original M-Systems DiskOnKey drive from 2000), flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB stick or USB memory, is a data storage device that includes flash memory with an integrated USB interface.
A wireless intercom is a telecommunications device that enables voice communication without the need to run copper wires between intercom stations.
A wireless microphone is a microphone without a physical cable connecting it directly to the sound recording or amplifying equipment with which it is associated.
CipheR, Cipher algorithm, Ciphertexts, Cryptographic algorithm, Cryptography algorithm, Data encryption, Data encryption software, Decrypt, Decrypter, Decryption key, Encrypt, Encrypted, Encrypting, Encryption algorithm, Encryption algorithms, Encryption and decryption, Encryptional wired system, Encrypts, List of ciphers.