Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptography Basics

10

Flashcards

0/10

Still learning
StarStarStarStar

Asymmetric Encryption

StarStarStarStar

Asymmetric encryption, also known as public key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. This solves the key distribution problem but is slower than symmetric encryption. It's fundamental for secure communication over the internet.

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

A Certificate Authority is a trusted entity that issues digital certificates used to verify the identity of websites and other entities on the internet. CAs are a critical component of the SSL/TLS protocol, enabling secure online transactions.

StarStarStarStar

Digital Signature

StarStarStarStar

A digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer. It provides non-repudiation, integrity, and authenticity for digital messages or documents.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

ECC is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows for smaller keys compared to non-ECC cryptography while providing equivalent security, enabling faster computations and lower power consumption.

StarStarStarStar

Key Stretching

StarStarStarStar

Key stretching techniques transform a short key into a longer one, usually to make it more secure against brute force attacks. Techniques like PBKDF2 and bcrypt are used to increase the difficulty of cracking passwords.

StarStarStarStar

Symmetric Encryption

StarStarStarStar

Symmetric encryption is a cryptographic protocol where the same key is used for both encryption and decryption. This method is fast but requires secure key distribution. It's essential for ensuring privacy in many secure communications.

StarStarStarStar

Cryptanalysis

StarStarStarStar

Cryptanalysis is the study of analyzing information systems to understand hidden aspects of the systems. It involves breaking cryptographic security systems to find weaknesses. Cryptanalysis is important for testing the strength of cryptographic protocols.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method for two parties to establish a shared secret over an insecure communication channel. It's a cornerstone of secure key exchange for asymmetric cryptography but is not immune to man-in-the-middle attacks.

StarStarStarStar

Cryptographic Nonce

StarStarStarStar

A nonce is an arbitrary number used only once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to prevent replay attacks. Its use is critical in protocols like SSL/TLS.

StarStarStarStar

Hash Function

StarStarStarStar

A hash function takes an input and produces a fixed-size string of bytes. The output, or hash, should ideally not be reversible and unique to the input. They are crucial for data integrity checks and password storage.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.