Algorithm - Answers A mathematical function that is used in the encryption and decryption processes. It
may be quite simple or extremely complex. Also defined as the set of instructions by which encryption
and decryption is done.
Asymmetric Encryption - Answers Process that uses different keys for encryption than it does for
decryption, and in which the decryption key is computationally infeasible to determine given the
encryption key itself, from plaintext and corresponding ciphertext, or from knowledge of the key
generation or encryption algorithm.
Block Mode Encryption - Answers Using fixed-length sequences of input plaintext symbols as the unit of
encryption.
Ciphertext - Answers The altered form of a plaintext message so as to be unreadable for anyone except
the intended recipients. In other words, it has been turned into a secret.
Collision - Answers This occurs when a hash function generates the same output for different inputs. In
other words, two different messages produce the same message digest.
Crime Prevention Through Environmental Design (CPTED) - Answers An architectural approach to the
design of buildings and spaces, which emphasizes passive features to reduce the likelihood of criminal
activity.
Cryptanalysis - Answers The study of techniques for attempting to defeat cryptographic techniques and,
more generally, information security services.
Cryptographic Hash, Cryptographic Hash Function - Answers A process or function that transforms an
input plaintext into a unique value called a hash (or hash value). These do not use cryptographic
algorithms; the term "cryptographic" refers to the assertion that strong hash algorithms are one-way
functions, that is, it is computationally infeasible to example of the use of a cryptographic hash.
determine the input plaintext from the hash value and knowledge of the algorithm alone. Message
digests are an example of the use of a cryptographic hash.
Cryptography - Answers The study or applications of methods to secure or protect the meaning and
content of messages, files or other information, usually by disguise, obscuration or other
transformations of that content and meaning .
Cryptosystem - Answers The complete set of hardware, software, communications elements and
procedures that allows parties to communicate, store information or use information that is protected
by cryptographic means. The system includes the algorithm, key and key management functions,
together with other services that can be provided through cryptography.