| sender, 36 | Vigen re tableau, 48 | | receiver, 36 | Vernam cipher, 48 | | transmission medium, 36 | book cipher, 49 | | interceptor, 36 | transposition, 52 | | intruder, 36 | columnar transposition, 52 | | encryption, 36 | digram, 54 | | decryption, 36 | trigram, 54 | | encode, 36 | product cipher, 55 | | decode, 36 | secure cryptographic system, 58 | | encipher , 36 | amount of secrecy , 58 | | decipher, 36 | error propagation, 58 | | cryptosystem, 36 | authentication, 59 | | cipher, 36 | key distribution, 60 | | plaintext, 36 | key management, 60 | | ciphertext , 36 | stream cipher, 60 | | key, 37 | block cipher, 60 | | keyless cipher, 37 | confusion, 62 | | symmetric, 37 | diffusion, 62 | | asymmetric, 37 | ciphertext-only attack, 63 | | cryptography, 38 | known plaintext attack, 63 | | cryptanalyst, 38 | probable plaintext attack, 63 | | cryptology, 38 | chosen plaintext attack, 63 | | break an encryption, 39 | chosen ciphertext attack, 64 | | breakable encryption, 40 | Data Encryption Standard (DES), 65 | | substitution, 41 | Data Encryption Algorithm-1, 66 | | transposition, 41 | double DES, 67 | | substitution cipher, 41 | triple DES, 68 | | monoalphabetic substitution, 41 simple substitution, 41 | Advanced Encryption Standard (AES), 69 | | Caesar cipher, 41 | Rijndael, 70 | | permutation, 44 | cycle or round, 70 | | one-time pad, 47 | public key, 73 | | private key, 73 | MD4, MD5, 77 | | secret key, 73 | SHA/SHS, 77 | | Rivest “Shamir “Adelman (RSA) algorithm, 75 | one-way function, 77 chaining, 77 | | cryptographic hash function, 77 | key exchange, 77 | | message digest, 77 | digital signature, 79 | | hash, 77 | certificate, 81 | | checksum, 77 | certificate authority, 84 | |