Category

Encryption Glossary

Select Questions

What is ciphertext?

A bunch of random letters and numbers which humans cannot make any sense of can be ciphertext. Ciphertext can also...

What is plaintext?

Plaintext can refer to anything which humans can understand and/or relate to. This may be as simple as English sentences...

What is Encryption?

Encryption is a method of scrambling information so just approved keyholders can comprehend the data. Encryption takes decipherable information and...

What is Decryption?

A process which does the reverse of Encryption. Using the key, the ciphertext will be converted back to plaintext.

What is cryptography?

Cryptography is the study of encryption and decryption, how to make files and folders unreadable to unauthorized users, how to...

What is an Encryption Algorithm?

Encryption algorithms are a mathematical formula which, with the help of a key, change our plaintext into ciphertext. It also...

What is hashing?

Hashing is a way to transform a given string into a fixed length string. A good hashing algorithm will produce...

What is Symmetric Encryption?

In symmetric encryption, there is just one key, and all entities use the same key for encryption and decryption. Symmetric...

What is Asymmetric Encryption?

Asymmetric Encryption, or public-key encryption, uses 2 keys. One is used for encryption, while only the other key can decrypt...

What is Data Masking?

Data masking is a process of replacing original production data into structurally similar, inauthentic data. The format of the data...

Define SSH

SSH or Secure Shell or Secure Socket Shell is a network protocol is how users, sysadmins can access other computers...

What is TLS/SSL?

When we use HTTPS to communicate with a web server, we use asymmetric encryption. For asymmetric encryption, we would need...

What is Key Management?

Key Management is the process of putting certain standards in place to ensure the security of cryptographic keys in an...

What is an HSM?

A Hardware Security Module or HSM is a specialized, highly trusted physical device. It is a network computer which performs...

What is an API?

An Application Programming Interface, or API, is an intermediary between two applications that handles requests and calls.

What are Secrets?

Secrets are privileged credentials that act as a key to unlock protected resources or sensitive data.

What is FIPS?

FIPS or Federal Information Processing Standards are a list of publicly announced standards issued by The United States Federal Government....

What is PCI DSS?

Payment Card Industry Data Security Standards is maintained by PCI council which maintains, evolves and promotes these safety standards of...

Define NIST 800-57

This provides recommendations about key management guidance which includes general guidance and best practices for Key Management. It also provides...

What is Public Key Cryptography?

Asymmetric Cryptography or Public Key cryptography is where 2 keys are used to establish secure connection between 2 entities in...

Where is PKI used?

PKI is helping us create secure networks. It uses asymmetric encryption to secure data in transit. A PKI also issues...

What is a Certificate Authority?

A Certificate Authority or CA is a highly trusted entity given the responsibility of signing and generating digital certificates. CAs...

What are the two types of CA?

Public CAs are organization which issue certificates to other organizations. Public CAs are generally trusted so certificates issued by them...

Define Certificate Management

Certificate Management is a software used for monitoring, processing, and executing every process in a certificate life cycle. They are...

What is Code Signing?

Code Signing is a process where digital signatures are used to sign codes such as executables and scripts. Later, this...

What does BYOK mean?

BYOK, or Bring Your Own Key, refers to the ability of a user to encrypt data within a Cloud Service,...

What is BYOE?

BYOE, or Bring Your Own Encryption, is also known as Hold Your Own Key, or HYOK. BYOE is used when...

What is Cryptographic Agility?

Often in the cybersecurity field, algorithms are broken or deemed to be too weak, and so the industry standards shift...

What is a Master Key?

A Master Key is a key, typically in an HSM, that encrypts all other keys within that HSM.

What is Hybrid KMS?

Hybrid KMS is a centralized management of accounts across all leading CSP's with custom API's for integration and the ability...

What is Software Key Management?

Software Key Management is where an organization uses software to manage their keys. Organizations that do not have access to...

What is Secret Management?

Secret Management distributes secrets across multiple user accounts in the Cloud. These secrets are stored in encrypted files or databases,...

Secret Management Advantages

Run the organizations own key management application in the cloud Lower cost than HSMs and full control of key services,...

Secret Management Disadvantages

Need to handle failover and replication yourself Not compliant with regulatory requirements which specify FIPS-certified hardware Approach is only suitable for...

Software Key Management Advantages

With this approach, service accounts, generic administrative accounts which may be assumed by one or more users, can access these secrets,...