blob: 63e0a6ce3f57cfda0b646807b93e4feb8a91546c [file] [log] [blame]
Alex Gaynor8c9dcb32013-11-03 13:10:57 -08001Glossary
2========
3
4.. glossary::
5
6 plaintext
7 User-readable data you care about.
8
9 ciphertext
10 The encoded data, it's not user readable. Potential attackers are able
11 to see this.
12
13 encryption
14 The process of converting plaintext to ciphertext.
15
16 decryption
17 The process of converting ciphertext to plaintext.
18
19 key
20 Secret data is encoded with a function using this key. Sometimes
Alex Gaynora0516bf2013-11-03 13:20:41 -080021 multiple keys are used. These **must** be kept secret, if a key is
22 exposed to an attacker, any data encrypted with it will be exposed.
Alex Gaynor8c9dcb32013-11-03 13:10:57 -080023
24 symmetric cryptography
25 Cryptographic operations where encryption and decryption use the same
26 key.
27
28 asymmetric cryptography
29 Cryptographic operations where encryption and decryption use different
Alex Gaynor9316f4c2013-11-15 16:38:42 -080030 keys. There are separate encryption and decryption keys.
Alex Gaynor953ebf82013-12-08 10:28:30 -080031
32 authentication
33 The process of verifying that a message was created by a specific
34 individual (or program). Like encryption, authentication can be either
35 symmetric or asymmetric. Authentication is necessary for effective
36 encryption.
37
38 Ciphertext indistinguishability
39 This is a property of encryption systems whereby two encrypted messages
40 aren't distinguishable without knowing the encryption key. This is
41 considered a basic, necessary property for a working encryption system.