An unencrypted message - "in the clear"
. An encrypted message
. Algorithm used to go from plaintext to ciphertext and back
. The practice and art of cracking encryption
. Add this to the cipher to decrypt - the longer it is, the more secure
. The encrypted text must be very very different than the original plaintext
. If we change one character of the plain text, the cipher text will be very very different
. Security that is easy to circumvent if you know how it's implemented - examples are SSID suppression and MAC filtering (both easy to get past)
. Type of encryption with single shared key for encryption process and decryption process - not good for large amounts of data - fast, low overhead, often combined with asymmetric
. Type of encryption where public key cryptography; two or more mathmatically related keys; private key (ONLY you have) and public key (goes out to anyone) - MUST be used together, no exception
. Type of encryption that uses curves instead of numbers - uses less power - smaller keys - used in mobile devices because they use less power
. Wireless algorithm that is old and weak, has design flaw, shouldn't be used
. Old encryption algorithms that are strong and haven't been found to have any vulnerabilities; PGP uses a "web of trust"
.
|