blob: 4421fca320aebc8818309e7f422b7752ea5b4c22 [file] [log] [blame]
Alex Gaynor8c9dcb32013-11-03 13:10:57 -08001Glossary
2========
3
4.. glossary::
Alex Gaynor2d160122014-01-02 09:41:24 -08005 :sorted:
Alex Gaynor8c9dcb32013-11-03 13:10:57 -08006
7 plaintext
8 User-readable data you care about.
9
10 ciphertext
11 The encoded data, it's not user readable. Potential attackers are able
12 to see this.
13
14 encryption
15 The process of converting plaintext to ciphertext.
16
17 decryption
18 The process of converting ciphertext to plaintext.
19
20 key
21 Secret data is encoded with a function using this key. Sometimes
Alex Gaynora0516bf2013-11-03 13:20:41 -080022 multiple keys are used. These **must** be kept secret, if a key is
23 exposed to an attacker, any data encrypted with it will be exposed.
Alex Gaynor8c9dcb32013-11-03 13:10:57 -080024
25 symmetric cryptography
26 Cryptographic operations where encryption and decryption use the same
27 key.
28
29 asymmetric cryptography
30 Cryptographic operations where encryption and decryption use different
Alex Gaynor9316f4c2013-11-15 16:38:42 -080031 keys. There are separate encryption and decryption keys.
Alex Gaynor953ebf82013-12-08 10:28:30 -080032
33 authentication
34 The process of verifying that a message was created by a specific
35 individual (or program). Like encryption, authentication can be either
36 symmetric or asymmetric. Authentication is necessary for effective
37 encryption.
38
Alex Gaynor2d160122014-01-02 09:41:24 -080039 ciphertext indistinguishability
Alex Gaynor953ebf82013-12-08 10:28:30 -080040 This is a property of encryption systems whereby two encrypted messages
41 aren't distinguishable without knowing the encryption key. This is
42 considered a basic, necessary property for a working encryption system.