Explore tens of thousands of sets crafted by our community.
Fundamentals of Cryptography
30
Flashcards
0/30
Elliptic Curve Cryptography (ECC)
An asymmetric encryption technique based on elliptic curves over finite fields.
Secure Sockets Layer (SSL)
A cryptographic protocol designed to provide secure communication over the Internet.
Advanced Encryption Standard (AES)
A symmetric block cipher adopted by the U.S. government.
Symmetric-key Encryption
A type of encryption where the same key is used for both encryption and decryption.
Pseudorandom Number Generator (PRNG)
An algorithm for generating a sequence of numbers that approximates the properties of random numbers.
Asymmetric-key Encryption
Encryption where two different keys are used: a public key for encryption and a private key for decryption.
Quantum Cryptography
The use of quantum mechanics to perform cryptographic tasks and secure communication.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Ciphertext
The result of encryption performed on plaintext rendered unreadable without the cipher key.
Cryptanalysis
The study of methods for obtaining the meaning of encrypted information, without access to the secret information typically required to do so.
Nonce
An arbitrary number that can be used just once in a cryptographic communication.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel.
RSA Algorithm
An asymmetric cryptographic algorithm based on the difficulty of factoring large integers.
Block Cipher
A symmetric encryption algorithm that operates on fixed-size blocks of data using a shared, secret key.
Public Key
A cryptographic key that can be disseminated widely to anyone. It is used for encrypting messages and verifying digital signatures.
Salt
Random data that is used as an additional input to a hash function that hashes a password or passphrase.
Transport Layer Security (TLS)
The successor to SSL, it provides secure communications over a computer network.
Side-channel Attack
An attack that makes use of the physical implementation of a cryptographic system, including timing information, power consumption, electromagnetic leaks, or sound.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes.
Data Encryption Standard (DES)
A symmetric-key algorithm for data encryption that was widely adopted around the world.
Triple DES (3DES)
An enhancement of DES that applies the DES cipher algorithm three times to each data block.
Certificate Authority (CA)
An organization that issues digital certificates for use by other parties, often for web site authentication.
Plaintext
The original message or data that is to be encrypted.
Private Key
A cryptographic key that must be kept secret. It is used for decrypting messages and creating digital signatures.
Message Authentication Code (MAC)
A short piece of information used to authenticate a message and provide integrity and authenticity assurances.
Collision Resistance
A property of hash functions where it is hard to find two different inputs that produce the same output hash.
One-time Pad (OTP)
An encryption technique that cannot be cracked if used correctly. Each byte of plaintext is encrypted by a secret random key that is as long as the plaintext.
Digital Signature
A cryptographic mechanism that verifies the authenticity of a message or document.
Steganography
The practice of concealing messages or information within other non-secret text or data.
Kerckhoffs's Principle
A principle in cryptography that stipulates that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
© Hypatia.Tech. 2024 All rights reserved.