8.7 Resources

Important Terms Introduced

  • assured pipeline

  • asymmetric cryptography

  • birthday attack

  • bit-flipping attack

  • bucket brigade attack

  • certificate chain

  • cryptonet

  • cryptoperiod

  • digital signature

  • elliptic curve cryptography

  • internal key

  • key encapsulation

  • key rollover

  • key splitting

  • key wrapping

  • keyed hash

  • man-in-the-middle attack

  • modular exponentiation

  • modular inverse

  • perfect forward secrecy

  • post-quantum cryptography

  • private key

  • public key

  • public-key certificate

  • public-key cryptography

  • quantum cryptanalysis

  • quantum cryptography

  • rekeying

  • reused key stream

  • root certificate authority

  • self-signed certificate

  • Separation of Duty

  • trusted third party

  • web of trust

Abbreviations Introduced

  • CA—certification authority

  • CEK—content encrypting ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.