Explore tens of thousands of sets crafted by our community.
Asymmetric Key Cryptography
30
Flashcards
0/30
Asymmetric Key Cryptography
A cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Public Key
The key in a public-key cryptography system that is shared openly and can be used to encrypt messages or to verify signatures.
Private Key
The key in a public-key cryptography system that is known only to the key's owner and used to decrypt messages or to digitally sign documents.
Encryption
The process of converting plaintext into ciphertext using a key, in order to secure its contents from unauthorized access.
Decryption
The process of converting ciphertext back into its original plaintext form using a key.
RSA Algorithm
A widely used asymmetric algorithm for encryption and digital signature, based on the mathematical difficulty of factoring large prime numbers.
Digital Signature
A mathematical scheme for demonstrating the authenticity of a digital message or document.
Certificate Authority (CA)
An entity that issues digital certificates verifying ownership of a public key by the named subject of the certificate.
Digital Certificate
An electronic document that uses a digital signature to bind a public key with an identity.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption.
Key Pair
In asymmetric cryptography, a set of two keys that consists of a public key and a private key.
Elliptic Curve Cryptography (ECC)
A public key encryption technique based on elliptic curve theory that enables smaller keys compared to non-ECC cryptography for equivalent security.
Hash Function
A function that converts a message into a fixed string of digits, usually for security or data integrity purposes.
Message Digest
A fixed-sized numerical value derived from a message that is nearly impossible to reverse-engineer.
Cryptographic Nonce
An arbitrary number that can be used just once in a cryptographic communication.
Key Exchange
A method of exchanging cryptographic keys securely between parties over a public channel.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel by two parties who have not shared secret information previously.
Man-in-the-Middle Attack (MitM)
A security attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Cipher
An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Symmetric Key Cryptography
A cryptographic system where the same key is used for both encryption and decryption of messages.
Quantum Cryptography
The use of quantum mechanical principles to carry out cryptographic tasks or to break cryptographic systems.
Cryptanalysis
The study of analyzing information systems to understand the hidden aspects of the systems.
Factorization
The decomposition of an object (for example, a number, a polynomial, or a matrix) into a product of other objects, or factors, which when multiplied together give the original.
Discrete Logarithm Problem
A mathematical problem with no efficient solution that forms the basis of several asymmetric key algorithms, including Diffie-Hellman and some elliptic curve techniques.
Prime Numbers
Numbers greater than 1 that have no positive divisors other than 1 and themselves, crucial for cryptographic algorithms such as RSA.
Modular Arithmetic
A system of arithmetic for integers, where numbers wrap around upon reaching a certain value—the modulus.
Blockchain
A distributed ledger technology that consists of a series of blocks that record data in hash functions with timestamps so that the data cannot be changed or tampered with.
Session Key
A single-use symmetric key used for encrypting all messages in one communication session.
Cryptographic Salt
Random data that is used as an additional input to a one-way function that hashes data, passwords, or passphrases.
Zero-Knowledge Proof
A method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is true.
© Hypatia.Tech. 2024 All rights reserved.