Email Alerts
-
plaintext
In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted. Definition
-
steganography
Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Definition
-
Escrowed Encryption Standard (EES)
The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.S. Department of Commerce in 1994 and is better known by the name of an implementation called the Clipper chip. Definition
-
cipher
A cipher (pronounced SAI-fuhr) is any method of encrypting text (concealing its readability and meaning). Definition
-
anonymous email
Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message. Definition
-
Rijndael
Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.S. National Institute of Standards and Technology (NIST) as the candidate for the Advanced Encryption Standard (AES). Definition
-
Data Encryption Standard (DES)
Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. Definition
-
block cipher
A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time. Definition
-
elliptical curve cryptography (ECC)
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. Definition
-
deniable encryption
Deniable encryption is a type of cryptography that allows an encrypted text to be decrypted in two or more ways, depending on which decryption key is used. Definition
Security Management Strategies for the CIO