Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Asymmetric Key Cryptography

30

Flashcards

0/30

Still learning
StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An entity that issues digital certificates verifying ownership of a public key by the named subject of the certificate.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts a message into a fixed string of digits, usually for security or data integrity purposes.

StarStarStarStar

Man-in-the-Middle Attack (MitM)

StarStarStarStar

A security attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

StarStarStarStar

Asymmetric Key Cryptography

StarStarStarStar

A cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

StarStarStarStar

Key Exchange

StarStarStarStar

A method of exchanging cryptographic keys securely between parties over a public channel.

StarStarStarStar

Cryptanalysis

StarStarStarStar

The study of analyzing information systems to understand the hidden aspects of the systems.

StarStarStarStar

Cryptographic Salt

StarStarStarStar

Random data that is used as an additional input to a one-way function that hashes data, passwords, or passphrases.

StarStarStarStar

RSA Algorithm

StarStarStarStar

A widely used asymmetric algorithm for encryption and digital signature, based on the mathematical difficulty of factoring large prime numbers.

StarStarStarStar

Key Pair

StarStarStarStar

In asymmetric cryptography, a set of two keys that consists of a public key and a private key.

StarStarStarStar

Private Key

StarStarStarStar

The key in a public-key cryptography system that is known only to the key's owner and used to decrypt messages or to digitally sign documents.

StarStarStarStar

Symmetric Key Cryptography

StarStarStarStar

A cryptographic system where the same key is used for both encryption and decryption of messages.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

A public key encryption technique based on elliptic curve theory that enables smaller keys compared to non-ECC cryptography for equivalent security.

StarStarStarStar

Factorization

StarStarStarStar

The decomposition of an object (for example, a number, a polynomial, or a matrix) into a product of other objects, or factors, which when multiplied together give the original.

StarStarStarStar

Decryption

StarStarStarStar

The process of converting ciphertext back into its original plaintext form using a key.

StarStarStarStar

Message Digest

StarStarStarStar

A fixed-sized numerical value derived from a message that is nearly impossible to reverse-engineer.

StarStarStarStar

Blockchain

StarStarStarStar

A distributed ledger technology that consists of a series of blocks that record data in hash functions with timestamps so that the data cannot be changed or tampered with.

StarStarStarStar

Session Key

StarStarStarStar

A single-use symmetric key used for encrypting all messages in one communication session.

StarStarStarStar

Public Key

StarStarStarStar

The key in a public-key cryptography system that is shared openly and can be used to encrypt messages or to verify signatures.

StarStarStarStar

Quantum Cryptography

StarStarStarStar

The use of quantum mechanical principles to carry out cryptographic tasks or to break cryptographic systems.

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption.

StarStarStarStar

Cryptographic Nonce

StarStarStarStar

An arbitrary number that can be used just once in a cryptographic communication.

StarStarStarStar

Modular Arithmetic

StarStarStarStar

A system of arithmetic for integers, where numbers wrap around upon reaching a certain value—the modulus.

StarStarStarStar

Digital Certificate

StarStarStarStar

An electronic document that uses a digital signature to bind a public key with an identity.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel by two parties who have not shared secret information previously.

StarStarStarStar

Cipher

StarStarStarStar

An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

StarStarStarStar

Discrete Logarithm Problem

StarStarStarStar

A mathematical problem with no efficient solution that forms the basis of several asymmetric key algorithms, including Diffie-Hellman and some elliptic curve techniques.

StarStarStarStar

Zero-Knowledge Proof

StarStarStarStar

A method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is true.

StarStarStarStar

Encryption

StarStarStarStar

The process of converting plaintext into ciphertext using a key, in order to secure its contents from unauthorized access.

StarStarStarStar

Digital Signature

StarStarStarStar

A mathematical scheme for demonstrating the authenticity of a digital message or document.

StarStarStarStar

Prime Numbers

StarStarStarStar

Numbers greater than 1 that have no positive divisors other than 1 and themselves, crucial for cryptographic algorithms such as RSA.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.