ANSWERS|LATEST
Steganography - ANSWER Hiding the existence of data within another type of file, such
as an image file.
Cryptography - ANSWER The practice of transforming information so that it is secure
and cannot be understood by unauthorized persons.
Encryption - ANSWER The process of changing plaintext into ciphertext.
Decryption - ANSWER The process of changing encrypted text into the original text.
Algorithm - ANSWER Consists of procedures based on a mathematical formula used to
encrypt and decrypt the data. Also called a cipher.
Nonrepudiation - ANSWER The process of proving that a user performed an action.
Obfuscation - ANSWER Making something obscure or unclear.
Data in processing - ANSWER Data actions being performed by "endpoint devices,"
such as printing a report from a desktop computer.
Data in transit - ANSWER Actions that transmit the data across a network.
1
, Data at rest - ANSWER Data that is stored on electronic media.
Low-power devices - ANSWER Small electronic devices that consume very small
amounts of power.
Resource vs. Security constraint - ANSWER A limitation in providing strong
cryptography due to the "tug-of-war" between the available resources (time and energy)
and the security provided by cryptography.
Low latency - ANSWER A small amount of time that occurs between when a byte is
input into a cryptographic algorithm and the time the output is obtained.
Weak key - ANSWER A key that causes the cipher to behave in unpredictable ways or
may compromise overall security.
Key length - ANSWER The number of bits in a key.
Longevity - ANSWER The useful lifetime of service of a cipher.
Entropy - ANSWER The measure of randomness of a datagenerating function.
High resiliency - ANSWER The ability to quickly recover from resource vs. Security
constraints.
Lightweight cryptography - ANSWER A category of cryptography that has fewer
features and is less robust than normal cryptography.
2
Steganography - ANSWER Hiding the existence of data within another type of file, such
as an image file.
Cryptography - ANSWER The practice of transforming information so that it is secure
and cannot be understood by unauthorized persons.
Encryption - ANSWER The process of changing plaintext into ciphertext.
Decryption - ANSWER The process of changing encrypted text into the original text.
Algorithm - ANSWER Consists of procedures based on a mathematical formula used to
encrypt and decrypt the data. Also called a cipher.
Nonrepudiation - ANSWER The process of proving that a user performed an action.
Obfuscation - ANSWER Making something obscure or unclear.
Data in processing - ANSWER Data actions being performed by "endpoint devices,"
such as printing a report from a desktop computer.
Data in transit - ANSWER Actions that transmit the data across a network.
1
, Data at rest - ANSWER Data that is stored on electronic media.
Low-power devices - ANSWER Small electronic devices that consume very small
amounts of power.
Resource vs. Security constraint - ANSWER A limitation in providing strong
cryptography due to the "tug-of-war" between the available resources (time and energy)
and the security provided by cryptography.
Low latency - ANSWER A small amount of time that occurs between when a byte is
input into a cryptographic algorithm and the time the output is obtained.
Weak key - ANSWER A key that causes the cipher to behave in unpredictable ways or
may compromise overall security.
Key length - ANSWER The number of bits in a key.
Longevity - ANSWER The useful lifetime of service of a cipher.
Entropy - ANSWER The measure of randomness of a datagenerating function.
High resiliency - ANSWER The ability to quickly recover from resource vs. Security
constraints.
Lightweight cryptography - ANSWER A category of cryptography that has fewer
features and is less robust than normal cryptography.
2