Explore tens of thousands of sets crafted by our community.
Cryptography Basics
10
Flashcards
0/10
Asymmetric Encryption
Asymmetric encryption, also known as public key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. This solves the key distribution problem but is slower than symmetric encryption. It's fundamental for secure communication over the internet.
Certificate Authority (CA)
A Certificate Authority is a trusted entity that issues digital certificates used to verify the identity of websites and other entities on the internet. CAs are a critical component of the SSL/TLS protocol, enabling secure online transactions.
Digital Signature
A digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer. It provides non-repudiation, integrity, and authenticity for digital messages or documents.
Elliptic Curve Cryptography (ECC)
ECC is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows for smaller keys compared to non-ECC cryptography while providing equivalent security, enabling faster computations and lower power consumption.
Key Stretching
Key stretching techniques transform a short key into a longer one, usually to make it more secure against brute force attacks. Techniques like PBKDF2 and bcrypt are used to increase the difficulty of cracking passwords.
Symmetric Encryption
Symmetric encryption is a cryptographic protocol where the same key is used for both encryption and decryption. This method is fast but requires secure key distribution. It's essential for ensuring privacy in many secure communications.
Cryptanalysis
Cryptanalysis is the study of analyzing information systems to understand hidden aspects of the systems. It involves breaking cryptographic security systems to find weaknesses. Cryptanalysis is important for testing the strength of cryptographic protocols.
Diffie-Hellman Key Exchange
A method for two parties to establish a shared secret over an insecure communication channel. It's a cornerstone of secure key exchange for asymmetric cryptography but is not immune to man-in-the-middle attacks.
Cryptographic Nonce
A nonce is an arbitrary number used only once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to prevent replay attacks. Its use is critical in protocols like SSL/TLS.
Hash Function
A hash function takes an input and produces a fixed-size string of bytes. The output, or hash, should ideally not be reversible and unique to the input. They are crucial for data integrity checks and password storage.
© Hypatia.Tech. 2024 All rights reserved.