Alex Gaynor | 8c9dcb3 | 2013-11-03 13:10:57 -0800 | [diff] [blame] | 1 | Glossary |
| 2 | ======== |
| 3 | |
| 4 | .. glossary:: |
Alex Gaynor | 2d16012 | 2014-01-02 09:41:24 -0800 | [diff] [blame] | 5 | :sorted: |
Alex Gaynor | 8c9dcb3 | 2013-11-03 13:10:57 -0800 | [diff] [blame] | 6 | |
| 7 | plaintext |
| 8 | User-readable data you care about. |
| 9 | |
| 10 | ciphertext |
| 11 | The encoded data, it's not user readable. Potential attackers are able |
| 12 | to see this. |
| 13 | |
| 14 | encryption |
| 15 | The process of converting plaintext to ciphertext. |
| 16 | |
| 17 | decryption |
| 18 | The process of converting ciphertext to plaintext. |
| 19 | |
| 20 | key |
| 21 | Secret data is encoded with a function using this key. Sometimes |
Alex Gaynor | a0516bf | 2013-11-03 13:20:41 -0800 | [diff] [blame] | 22 | multiple keys are used. These **must** be kept secret, if a key is |
| 23 | exposed to an attacker, any data encrypted with it will be exposed. |
Alex Gaynor | 8c9dcb3 | 2013-11-03 13:10:57 -0800 | [diff] [blame] | 24 | |
| 25 | symmetric cryptography |
| 26 | Cryptographic operations where encryption and decryption use the same |
| 27 | key. |
| 28 | |
| 29 | asymmetric cryptography |
| 30 | Cryptographic operations where encryption and decryption use different |
Alex Gaynor | 9316f4c | 2013-11-15 16:38:42 -0800 | [diff] [blame] | 31 | keys. There are separate encryption and decryption keys. |
Alex Gaynor | 953ebf8 | 2013-12-08 10:28:30 -0800 | [diff] [blame] | 32 | |
| 33 | authentication |
| 34 | The process of verifying that a message was created by a specific |
| 35 | individual (or program). Like encryption, authentication can be either |
| 36 | symmetric or asymmetric. Authentication is necessary for effective |
| 37 | encryption. |
| 38 | |
Alex Gaynor | 2d16012 | 2014-01-02 09:41:24 -0800 | [diff] [blame] | 39 | ciphertext indistinguishability |
Alex Gaynor | 953ebf8 | 2013-12-08 10:28:30 -0800 | [diff] [blame] | 40 | This is a property of encryption systems whereby two encrypted messages |
| 41 | aren't distinguishable without knowing the encryption key. This is |
| 42 | considered a basic, necessary property for a working encryption system. |