Explore tens of thousands of sets crafted by our community.
Asymmetric Key Cryptography
30
Flashcards
0/30
Certificate Authority (CA)
An entity that issues digital certificates verifying ownership of a public key by the named subject of the certificate.
Hash Function
A function that converts a message into a fixed string of digits, usually for security or data integrity purposes.
Man-in-the-Middle Attack (MitM)
A security attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Asymmetric Key Cryptography
A cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Key Exchange
A method of exchanging cryptographic keys securely between parties over a public channel.
Cryptanalysis
The study of analyzing information systems to understand the hidden aspects of the systems.
Cryptographic Salt
Random data that is used as an additional input to a one-way function that hashes data, passwords, or passphrases.
RSA Algorithm
A widely used asymmetric algorithm for encryption and digital signature, based on the mathematical difficulty of factoring large prime numbers.
Key Pair
In asymmetric cryptography, a set of two keys that consists of a public key and a private key.
Private Key
The key in a public-key cryptography system that is known only to the key's owner and used to decrypt messages or to digitally sign documents.
Symmetric Key Cryptography
A cryptographic system where the same key is used for both encryption and decryption of messages.
Elliptic Curve Cryptography (ECC)
A public key encryption technique based on elliptic curve theory that enables smaller keys compared to non-ECC cryptography for equivalent security.
Factorization
The decomposition of an object (for example, a number, a polynomial, or a matrix) into a product of other objects, or factors, which when multiplied together give the original.
Decryption
The process of converting ciphertext back into its original plaintext form using a key.
Message Digest
A fixed-sized numerical value derived from a message that is nearly impossible to reverse-engineer.
Blockchain
A distributed ledger technology that consists of a series of blocks that record data in hash functions with timestamps so that the data cannot be changed or tampered with.
Session Key
A single-use symmetric key used for encrypting all messages in one communication session.
Public Key
The key in a public-key cryptography system that is shared openly and can be used to encrypt messages or to verify signatures.
Quantum Cryptography
The use of quantum mechanical principles to carry out cryptographic tasks or to break cryptographic systems.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption.
Cryptographic Nonce
An arbitrary number that can be used just once in a cryptographic communication.
Modular Arithmetic
A system of arithmetic for integers, where numbers wrap around upon reaching a certain value—the modulus.
Digital Certificate
An electronic document that uses a digital signature to bind a public key with an identity.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel by two parties who have not shared secret information previously.
Cipher
An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Discrete Logarithm Problem
A mathematical problem with no efficient solution that forms the basis of several asymmetric key algorithms, including Diffie-Hellman and some elliptic curve techniques.
Zero-Knowledge Proof
A method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is true.
Encryption
The process of converting plaintext into ciphertext using a key, in order to secure its contents from unauthorized access.
Digital Signature
A mathematical scheme for demonstrating the authenticity of a digital message or document.
Prime Numbers
Numbers greater than 1 that have no positive divisors other than 1 and themselves, crucial for cryptographic algorithms such as RSA.
© Hypatia.Tech. 2024 All rights reserved.