Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptography Algorithms

15

Flashcards

0/15

Still learning
StarStarStarStar

MD5 (Message Digest Algorithm 5)

StarStarStarStar

Type: Cryptographic Hash Function Use-case: Deprecated due to vulnerabilities, formerly used for data integrity checks

StarStarStarStar

SHA-256 (Secure Hash Algorithm 256-bit)

StarStarStarStar

Type: Cryptographic Hash Function Use-case: Data integrity verification, such as file checksums and Blockchain technology

StarStarStarStar

ECC (Elliptic Curve Cryptography)

StarStarStarStar

Type: Asymmetric Key Cryptography Use-case: Providing similar levels of security as RSA but with smaller key sizes, ideal for mobile devices

StarStarStarStar

Serpent

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: An alternative to AES for general encryption tasks

StarStarStarStar

RSA (Rivest–Shamir–Adleman)

StarStarStarStar

Type: Asymmetric Key Cryptography Use-case: Secure data transmission and digital signatures

StarStarStarStar

Blowfish

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: Encrypting data on a lower-resource environment such as embedded systems

StarStarStarStar

PGP (Pretty Good Privacy)

StarStarStarStar

Type: Encryption Program Use-case: Securely transmitting messages and files with both symmetric and asymmetric encryption

StarStarStarStar

AES (Advanced Encryption Standard)

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: Encrypting sensitive data in transit or at rest

StarStarStarStar

DES (Data Encryption Standard)

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: Now obsolete, the first encryption algorithm approved by the US government for public disclosure

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

Type: Key Agreement Protocol Use-case: Securely exchanging cryptographic keys over a public channel

StarStarStarStar

Twofish

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: Encryption in software and hardware environments where AES is not suitable

StarStarStarStar

ElGamal Encryption

StarStarStarStar

Type: Asymmetric Key Cryptography Use-case: Encrypting data and ensuring secure key exchange

StarStarStarStar

Scrypt

StarStarStarStar

Type: Password Derivation Function Using-case: Protecting the integrity of cryptocurrencies like Litecoin and for key derivation

StarStarStarStar

HMAC (Hash-based Message Authentication Code)

StarStarStarStar

Type: Message Authentication Code (MAC) Use-case: Verifying data integrity and authenticity of a message with a shared secret key

StarStarStarStar

3DES (Triple Data Encryption Standard)

StarStarStarStar

Type: Symmetric Key Cryptography Use-case: Legacy systems requiring higher security than DES, gradually being phased out

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.