Explore tens of thousands of sets crafted by our community.
Fundamentals of Cryptography
30
Flashcards
0/30
Symmetric-key Encryption
A type of encryption where the same key is used for both encryption and decryption.
Asymmetric-key Encryption
Encryption where two different keys are used: a public key for encryption and a private key for decryption.
RSA Algorithm
An asymmetric cryptographic algorithm based on the difficulty of factoring large integers.
Elliptic Curve Cryptography (ECC)
An asymmetric encryption technique based on elliptic curves over finite fields.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes.
Collision Resistance
A property of hash functions where it is hard to find two different inputs that produce the same output hash.
Public Key
A cryptographic key that can be disseminated widely to anyone. It is used for encrypting messages and verifying digital signatures.
Private Key
A cryptographic key that must be kept secret. It is used for decrypting messages and creating digital signatures.
Digital Signature
A cryptographic mechanism that verifies the authenticity of a message or document.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel.
Advanced Encryption Standard (AES)
A symmetric block cipher adopted by the U.S. government.
Data Encryption Standard (DES)
A symmetric-key algorithm for data encryption that was widely adopted around the world.
Triple DES (3DES)
An enhancement of DES that applies the DES cipher algorithm three times to each data block.
Quantum Cryptography
The use of quantum mechanics to perform cryptographic tasks and secure communication.
Message Authentication Code (MAC)
A short piece of information used to authenticate a message and provide integrity and authenticity assurances.
Cryptanalysis
The study of methods for obtaining the meaning of encrypted information, without access to the secret information typically required to do so.
Pseudorandom Number Generator (PRNG)
An algorithm for generating a sequence of numbers that approximates the properties of random numbers.
Certificate Authority (CA)
An organization that issues digital certificates for use by other parties, often for web site authentication.
Secure Sockets Layer (SSL)
A cryptographic protocol designed to provide secure communication over the Internet.
Transport Layer Security (TLS)
The successor to SSL, it provides secure communications over a computer network.
Kerckhoffs's Principle
A principle in cryptography that stipulates that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Nonce
An arbitrary number that can be used just once in a cryptographic communication.
Salt
Random data that is used as an additional input to a hash function that hashes a password or passphrase.
Steganography
The practice of concealing messages or information within other non-secret text or data.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Block Cipher
A symmetric encryption algorithm that operates on fixed-size blocks of data using a shared, secret key.
Plaintext
The original message or data that is to be encrypted.
Ciphertext
The result of encryption performed on plaintext rendered unreadable without the cipher key.
Side-channel Attack
An attack that makes use of the physical implementation of a cryptographic system, including timing information, power consumption, electromagnetic leaks, or sound.
One-time Pad (OTP)
An encryption technique that cannot be cracked if used correctly. Each byte of plaintext is encrypted by a secret random key that is as long as the plaintext.
© Hypatia.Tech. 2024 All rights reserved.