Explore tens of thousands of sets crafted by our community.
Basic Cryptography Terms
30
Flashcards
0/30
Decryption
The process of converting ciphertext back into plaintext using a cipher and a key.
Public Key
The key in an asymmetric key algorithm that is shared publicly without compromising security.
Elliptic Curve Cryptography (ECC)
An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
RSA
An asymmetric cryptographic algorithm based on the fact that factoring the product of two large prime numbers is hard.
Encryption
The process of converting plaintext into ciphertext using a cipher and a key.
Nonce
A number or bit string used in cryptography that is used only once, in order to ensure that old communications cannot be reused in replay attacks.
Ciphertext
The encrypted data produced by a cryptographic algorithm.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes, typically for security or data integrity purposes.
Symmetric-Key Cryptography
A cryptographic system that uses the same key for encryption and decryption.
Key Exchange
The process through which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
Stream Cipher
A symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
Homomorphic Encryption
A form of encryption that allows computations to be performed on ciphertext, thus generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.
Private Key
The key in an asymmetric key algorithm that is kept secret and is used for decryption.
Discrete Logarithm Problem
The problem of finding the exponent base b given b, g (a primitive root modulo p), and a value g^b mod p.
Digital Signature
A mathematical scheme for demonstrating the authenticity and integrity of a digital message or document.
Key Derivation Function (KDF)
A cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudo-random function.
Cryptanalysis
The study of analyzing information systems to understand hidden aspects of the systems.
X.509
A standard defining the format of public key certificates.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel.
Asymmetric-Key Cryptography
A cryptographic system that uses a pair of keys; one for encryption (public key) and one for decryption (private key).
Block Cipher
A symmetric key cipher that encrypts data in fixed-size blocks, as opposed to stream ciphers, which encrypt data one bit at a time.
Cipher
An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Certificate Authority (CA)
An entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate.
Zero-Knowledge Proof
A cryptographic method by which one party can prove to another party that they know a value x, without conveying any information apart from the fact that they know the value x.
Plaintext
The original unencrypted data that is input into cryptographic algorithms.
Quantum Cryptography
The use of quantum mechanics to perform cryptographic tasks or to break cryptographic systems.
Cryptographic Hash Function
A hash function that is suitable for use in cryptography—it is a one-way function and it is very hard to reverse the computation or find collisions.
Message Authentication Code (MAC)
A short piece of information used to authenticate a message and to provide integrity and authenticity assurances on the message.
Cryptographic Salt
Random data that is used as an additional input to a hash function that hashes a password or passphrase.
Side-Channel Attack
An attack which takes advantage of the implementation of a computer system or algorithm rather than weaknesses in the actual implementation itself.
© Hypatia.Tech. 2024 All rights reserved.