Vocabulary Terms

Cybersecurity is an important concern for the Internet and the systems built on it.

Back to standards


Asymmetric encryption
Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt
Caesar Cipher
A technique for encryption that shifts the alphabet by some number of characters
The generic term for a technique (or algorithm) that performs encryption
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption
A process that reverses encryption, taking a secret message and reproducing the original plain text
A mechanism for hiding the original contents of data through an algorithmic process
Private Key
In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key
Public Key Encryption
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private
Random Substitution Cipher
An encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.