Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Fundamentals of Cryptography

30

Flashcards

0/30

Still learning
StarStarStarStar

Collision Resistance

StarStarStarStar

A property of hash functions where it is hard to find two different inputs that produce the same output hash.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel.

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An organization that issues digital certificates for use by other parties, often for web site authentication.

StarStarStarStar

Side-channel Attack

StarStarStarStar

An attack that makes use of the physical implementation of a cryptographic system, including timing information, power consumption, electromagnetic leaks, or sound.

StarStarStarStar

Data Encryption Standard (DES)

StarStarStarStar

A symmetric-key algorithm for data encryption that was widely adopted around the world.

StarStarStarStar

Nonce

StarStarStarStar

An arbitrary number that can be used just once in a cryptographic communication.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts an input (or 'message') into a fixed-size string of bytes.

StarStarStarStar

Steganography

StarStarStarStar

The practice of concealing messages or information within other non-secret text or data.

StarStarStarStar

Digital Signature

StarStarStarStar

A cryptographic mechanism that verifies the authenticity of a message or document.

StarStarStarStar

Pseudorandom Number Generator (PRNG)

StarStarStarStar

An algorithm for generating a sequence of numbers that approximates the properties of random numbers.

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

An asymmetric encryption technique based on elliptic curves over finite fields.

StarStarStarStar

Quantum Cryptography

StarStarStarStar

The use of quantum mechanics to perform cryptographic tasks and secure communication.

StarStarStarStar

Asymmetric-key Encryption

StarStarStarStar

Encryption where two different keys are used: a public key for encryption and a private key for decryption.

StarStarStarStar

Message Authentication Code (MAC)

StarStarStarStar

A short piece of information used to authenticate a message and provide integrity and authenticity assurances.

StarStarStarStar

One-time Pad (OTP)

StarStarStarStar

An encryption technique that cannot be cracked if used correctly. Each byte of plaintext is encrypted by a secret random key that is as long as the plaintext.

StarStarStarStar

Private Key

StarStarStarStar

A cryptographic key that must be kept secret. It is used for decrypting messages and creating digital signatures.

StarStarStarStar

Symmetric-key Encryption

StarStarStarStar

A type of encryption where the same key is used for both encryption and decryption.

StarStarStarStar

Salt

StarStarStarStar

Random data that is used as an additional input to a hash function that hashes a password or passphrase.

StarStarStarStar

Ciphertext

StarStarStarStar

The result of encryption performed on plaintext rendered unreadable without the cipher key.

StarStarStarStar

RSA Algorithm

StarStarStarStar

An asymmetric cryptographic algorithm based on the difficulty of factoring large integers.

StarStarStarStar

Advanced Encryption Standard (AES)

StarStarStarStar

A symmetric block cipher adopted by the U.S. government.

StarStarStarStar

Public Key

StarStarStarStar

A cryptographic key that can be disseminated widely to anyone. It is used for encrypting messages and verifying digital signatures.

StarStarStarStar

Triple DES (3DES)

StarStarStarStar

An enhancement of DES that applies the DES cipher algorithm three times to each data block.

StarStarStarStar

Plaintext

StarStarStarStar

The original message or data that is to be encrypted.

StarStarStarStar

Cryptanalysis

StarStarStarStar

The study of methods for obtaining the meaning of encrypted information, without access to the secret information typically required to do so.

StarStarStarStar

Block Cipher

StarStarStarStar

A symmetric encryption algorithm that operates on fixed-size blocks of data using a shared, secret key.

StarStarStarStar

Secure Sockets Layer (SSL)

StarStarStarStar

A cryptographic protocol designed to provide secure communication over the Internet.

StarStarStarStar

Transport Layer Security (TLS)

StarStarStarStar

The successor to SSL, it provides secure communications over a computer network.

StarStarStarStar

Kerckhoffs's Principle

StarStarStarStar

A principle in cryptography that stipulates that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.