Explore tens of thousands of sets crafted by our community.
Fundamentals of Cryptography
30
Flashcards
0/30
Collision Resistance
A property of hash functions where it is hard to find two different inputs that produce the same output hash.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel.
Certificate Authority (CA)
An organization that issues digital certificates for use by other parties, often for web site authentication.
Side-channel Attack
An attack that makes use of the physical implementation of a cryptographic system, including timing information, power consumption, electromagnetic leaks, or sound.
Data Encryption Standard (DES)
A symmetric-key algorithm for data encryption that was widely adopted around the world.
Nonce
An arbitrary number that can be used just once in a cryptographic communication.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes.
Steganography
The practice of concealing messages or information within other non-secret text or data.
Digital Signature
A cryptographic mechanism that verifies the authenticity of a message or document.
Pseudorandom Number Generator (PRNG)
An algorithm for generating a sequence of numbers that approximates the properties of random numbers.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Elliptic Curve Cryptography (ECC)
An asymmetric encryption technique based on elliptic curves over finite fields.
Quantum Cryptography
The use of quantum mechanics to perform cryptographic tasks and secure communication.
Asymmetric-key Encryption
Encryption where two different keys are used: a public key for encryption and a private key for decryption.
Message Authentication Code (MAC)
A short piece of information used to authenticate a message and provide integrity and authenticity assurances.
One-time Pad (OTP)
An encryption technique that cannot be cracked if used correctly. Each byte of plaintext is encrypted by a secret random key that is as long as the plaintext.
Private Key
A cryptographic key that must be kept secret. It is used for decrypting messages and creating digital signatures.
Symmetric-key Encryption
A type of encryption where the same key is used for both encryption and decryption.
Salt
Random data that is used as an additional input to a hash function that hashes a password or passphrase.
Ciphertext
The result of encryption performed on plaintext rendered unreadable without the cipher key.
RSA Algorithm
An asymmetric cryptographic algorithm based on the difficulty of factoring large integers.
Advanced Encryption Standard (AES)
A symmetric block cipher adopted by the U.S. government.
Public Key
A cryptographic key that can be disseminated widely to anyone. It is used for encrypting messages and verifying digital signatures.
Triple DES (3DES)
An enhancement of DES that applies the DES cipher algorithm three times to each data block.
Plaintext
The original message or data that is to be encrypted.
Cryptanalysis
The study of methods for obtaining the meaning of encrypted information, without access to the secret information typically required to do so.
Block Cipher
A symmetric encryption algorithm that operates on fixed-size blocks of data using a shared, secret key.
Secure Sockets Layer (SSL)
A cryptographic protocol designed to provide secure communication over the Internet.
Transport Layer Security (TLS)
The successor to SSL, it provides secure communications over a computer network.
Kerckhoffs's Principle
A principle in cryptography that stipulates that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
© Hypatia.Tech. 2024 All rights reserved.