Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Encryption Algorithms

10

Flashcards

0/10

Still learning
StarStarStarStar

RSA (Rivest-Shamir-Adleman)

StarStarStarStar

An asymmetric cryptographic algorithm for secure data transmission. It uses two keys: a public key to encrypt data and a private key for decryption. It's widely used for secure communication in browsers, email, VPNs, and more.

StarStarStarStar

DES (Data Encryption Standard)

StarStarStarStar

A symmetric-key algorithm used to encrypt electronic data. It was once widely used in government and industry, but is now considered to be insecure because of its 56-bit key size. It encrypts data in 64-bit blocks and is now succeeded by AES.

StarStarStarStar

SHA (Secure Hash Algorithm)

StarStarStarStar

A set of cryptographic hash functions designed by the NSA. SHA-256, part of this set, is used to hash data in such a way that it is nearly impossible to replicate the original data from the hash result. Commonly employed in blockchain technology and digital signatures.

StarStarStarStar

Blowfish

StarStarStarStar

A symmetric block cipher designed to replace DES. It has a variable key length from 32 bits up to 448 bits and is known for both its speed and effectiveness, particularly in hardware implementations. Often used in software applications that require encryption.

StarStarStarStar

3DES (Triple Data Encryption Standard)

StarStarStarStar

A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. Though more secure than DES, it is slower and has been largely replaced by AES. Encrypts data in 64-bit blocks with key bundles that effectively have a length of 168, 112, or 56 bits.

StarStarStarStar

AES (Advanced Encryption Standard)

StarStarStarStar

A symmetric block cipher chosen by the U.S. government to protect classified information. It encrypts data in 128-bit blocks and supports key sizes of 128, 192, or 256 bits. Commonly used for securing sensitive but unclassified material by government agencies and the private sector.

StarStarStarStar

Twofish

StarStarStarStar

A symmetric block cipher and a finalist in the NIST's Advanced Encryption Standard contest. It is a successor to Blowfish with a block size of 128 bits and key sizes up to 256 bits. It's known for its flexibility in both software and hardware implementations.

StarStarStarStar

ECC (Elliptic Curve Cryptography)

StarStarStarStar

An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows for smaller keys compared to non-ECC cryptography while providing equivalent security. Used in a variety of applications including SSL/TLS and cryptocurrency.

StarStarStarStar

Diffie-Hellman

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel and was one of the first protocols to enable encrypted communication without the need to exchange a key via a secure channel first. Commonly used in creating secure connections.

StarStarStarStar

PGP (Pretty Good Privacy)

StarStarStarStar

A data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is used for securing emails and files with a mix of compression, hashing, symmetric-key cryptography, and public-key cryptography.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.