Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Basic Cryptography Terms

30

Flashcards

0/30

Still learning
StarStarStarStar

Decryption

StarStarStarStar

The process of converting ciphertext back into plaintext using a cipher and a key.

StarStarStarStar

Public Key

StarStarStarStar

The key in an asymmetric key algorithm that is shared publicly without compromising security.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

StarStarStarStar

RSA

StarStarStarStar

An asymmetric cryptographic algorithm based on the fact that factoring the product of two large prime numbers is hard.

StarStarStarStar

Encryption

StarStarStarStar

The process of converting plaintext into ciphertext using a cipher and a key.

StarStarStarStar

Nonce

StarStarStarStar

A number or bit string used in cryptography that is used only once, in order to ensure that old communications cannot be reused in replay attacks.

StarStarStarStar

Ciphertext

StarStarStarStar

The encrypted data produced by a cryptographic algorithm.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts an input (or 'message') into a fixed-size string of bytes, typically for security or data integrity purposes.

StarStarStarStar

Symmetric-Key Cryptography

StarStarStarStar

A cryptographic system that uses the same key for encryption and decryption.

StarStarStarStar

Key Exchange

StarStarStarStar

The process through which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

StarStarStarStar

Stream Cipher

StarStarStarStar

A symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

StarStarStarStar

Homomorphic Encryption

StarStarStarStar

A form of encryption that allows computations to be performed on ciphertext, thus generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.

StarStarStarStar

Private Key

StarStarStarStar

The key in an asymmetric key algorithm that is kept secret and is used for decryption.

StarStarStarStar

Discrete Logarithm Problem

StarStarStarStar

The problem of finding the exponent base b given b, g (a primitive root modulo p), and a value g^b mod p.

StarStarStarStar

Digital Signature

StarStarStarStar

A mathematical scheme for demonstrating the authenticity and integrity of a digital message or document.

StarStarStarStar

Key Derivation Function (KDF)

StarStarStarStar

A cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudo-random function.

StarStarStarStar

Cryptanalysis

StarStarStarStar

The study of analyzing information systems to understand hidden aspects of the systems.

StarStarStarStar

X.509

StarStarStarStar

A standard defining the format of public key certificates.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel.

StarStarStarStar

Asymmetric-Key Cryptography

StarStarStarStar

A cryptographic system that uses a pair of keys; one for encryption (public key) and one for decryption (private key).

StarStarStarStar

Block Cipher

StarStarStarStar

A symmetric key cipher that encrypts data in fixed-size blocks, as opposed to stream ciphers, which encrypt data one bit at a time.

StarStarStarStar

Cipher

StarStarStarStar

An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate.

StarStarStarStar

Zero-Knowledge Proof

StarStarStarStar

A cryptographic method by which one party can prove to another party that they know a value x, without conveying any information apart from the fact that they know the value x.

StarStarStarStar

Plaintext

StarStarStarStar

The original unencrypted data that is input into cryptographic algorithms.

StarStarStarStar

Quantum Cryptography

StarStarStarStar

The use of quantum mechanics to perform cryptographic tasks or to break cryptographic systems.

StarStarStarStar

Cryptographic Hash Function

StarStarStarStar

A hash function that is suitable for use in cryptography—it is a one-way function and it is very hard to reverse the computation or find collisions.

StarStarStarStar

Message Authentication Code (MAC)

StarStarStarStar

A short piece of information used to authenticate a message and to provide integrity and authenticity assurances on the message.

StarStarStarStar

Cryptographic Salt

StarStarStarStar

Random data that is used as an additional input to a hash function that hashes a password or passphrase.

StarStarStarStar

Side-Channel Attack

StarStarStarStar

An attack which takes advantage of the implementation of a computer system or algorithm rather than weaknesses in the actual implementation itself.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.