▶ 8.7 Resources
Important Terms Introduced
assured pipeline
asymmetric cryptography
birthday attack
bit-flipping attack
bucket brigade attack
certificate chain
cryptonet
cryptoperiod
digital signature
elliptic curve cryptography
internal key
key encapsulation
key rollover
key splitting
key wrapping
keyed hash
man-in-the-middle attack
modular exponentiation
modular inverse
perfect forward secrecy
post-quantum cryptography
private key
public key
public-key certificate
public-key cryptography
quantum cryptanalysis
quantum cryptography
rekeying
reused key stream
root certificate authority
self-signed certificate
Separation of Duty
trusted third party
web of trust
Abbreviations Introduced
CA—certification authority
CEK—content encrypting ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.