Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptographic Protocol Concepts

30

Flashcards

0/30

Still learning
StarStarStarStar

Data Encryption Standard (DES)

StarStarStarStar

An outdated symmetric-key method of data encryption. Significant historically for being one of the first encryption algorithms widely adopted by governments and industries.

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A framework of policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Significant for enabling secure transfers and authentication over networks.

StarStarStarStar

Advanced Encryption Standard (AES)

StarStarStarStar

A symmetric key encryption algorithm chosen by the U.S. government to protect classified information. Significant for being the most widely used encryption algorithm globally.

StarStarStarStar

Asymmetric-key Cryptography

StarStarStarStar

A cryptographic system that uses a pair of keys – a public key and a private key – for secure data exchange. It's significant for enabling secure communication between parties who have never met.

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An entity that issues digital certificates. The CA certifies the ownership of a public key by the named subject of the certificate. Significant in establishing trust in electronic environments.

StarStarStarStar

Symmetric-key Cryptography

StarStarStarStar

A cryptographic system that uses the same key for encryption and decryption. It is significant for its speed and efficiency in secure communication.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

A public key encryption technique based on the algebraic structure of elliptic curves over finite fields. Significant for providing the same level of security as RSA with smaller key sizes, enhancing performance and efficiency.

StarStarStarStar

One-Time Pad (OTP)

StarStarStarStar

A simple, yet perfectly secure encryption technique that cannot be cracked if used correctly. Significant for providing information-theoretic security, often used for the most secret communications.

StarStarStarStar

Quantum Key Distribution (QKD)

StarStarStarStar

A secure communication method that implements a cryptographic protocol involving components of quantum mechanics. Significant for providing secure communication that is guaranteed by the quantum laws of physics.

StarStarStarStar

Message Authentication Code (MAC)

StarStarStarStar

A short piece of information used to authenticate a message and to provide integrity and authenticity assurances. Significant as an essential part of secure communications.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts an input into a fixed-size string of bytes. Hash functions are significant in verifying data integrity and are a core component of various cryptographic algorithms.

StarStarStarStar

Digital Signature

StarStarStarStar

A digital code (generated and authenticated by public key cryptography) that is attached to an electronically transmitted document to verify its contents and the sender's identity. Significant for non-repudiation and data integrity.

StarStarStarStar

Pretty Good Privacy (PGP)

StarStarStarStar

An encryption program that provides cryptographic privacy and authentication for data communication. Significant for being commonly used for securing emails and files.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel. Significant for allowing two parties to establish a shared secret which can be used for secret communications.

StarStarStarStar

RSA Algorithm

StarStarStarStar

An algorithm for public-key cryptography that is based on the assumed difficulty of factoring large integers. Significant for being the first algorithm suitable for signing as well as encryption.

StarStarStarStar

Transport Layer Security (TLS)

StarStarStarStar

A protocol that ensures privacy between communicating applications and their users on the internet. Significant for securing web traffic and protecting data from eavesdropping and tampering.

StarStarStarStar

Block Cipher

StarStarStarStar

A method of encrypting text to produce ciphertext in which a cryptographic key and algorithm are applied to a block of data at once as a group rather than to one bit at a time. Significant for its use in various symmetric encryption schemes.

StarStarStarStar

Secure Shell (SSH)

StarStarStarStar

A cryptographic network protocol for operating network services securely over an unsecured network. Significant for providing a secure channel in a client-server architecture.

StarStarStarStar

Triple Data Encryption Algorithm (Triple DES)

StarStarStarStar

An encryption algorithm that applies the DES cipher algorithm three times to each data block. Significant for improving the security of original DES by increasing the key length.

StarStarStarStar

Kerberos

StarStarStarStar

A network authentication protocol designed to provide strong authentication for client/server applications using secret-key cryptography. Significant as a solution for secure login and authentication over non-secure networks.

StarStarStarStar

Secure/Multipurpose Internet Mail Extensions (S/MIME)

StarStarStarStar

A standard for public key encryption and signing of MIME data. Significant as it's widely used in enterprise environments for securing emails by providing confidentiality, integrity checks, and authentication.

StarStarStarStar

Nonce

StarStarStarStar

An arbitrary number that can only be used once in a cryptographic communication. Significant in authentication protocols to prevent replay attacks and to ensure that messages are unique.

StarStarStarStar

Stream Cipher

StarStarStarStar

An encryption algorithm that encrypts a digital data stream one bit or one byte at a time. Significant for its efficiency in certain applications like encrypting data streams where data arrives in an unpredictable manner.

StarStarStarStar

Quantum Cryptography

StarStarStarStar

The science of exploiting quantum mechanical properties to perform cryptographic tasks. Significant as it could potentially create uncrackable encryption methods, not even by quantum computers.

StarStarStarStar

Homomorphic Encryption

StarStarStarStar

A form of encryption that allows computation on ciphertexts, generating an encrypted result that, once decrypted, matches the result of operations performed on the plaintext. Significant for secure data processing in cloud computing.

StarStarStarStar

X.509 Certificate

StarStarStarStar

A standard defining the format of public key certificates. Significant for its role in Public Key Infrastructure (PKI) to establish a chain of trust and confirming the authenticity of the binding between a public key and its owner.

StarStarStarStar

Zero-Knowledge Proof

StarStarStarStar

A method by which one party can prove to another that a statement is true without conveying any information apart from the fact that the statement is true. Significant in authentication protocols without revealing any passwords.

StarStarStarStar

Lightweight Cryptography

StarStarStarStar

Cryptographic algorithms designed to be implemented in constrained environments such as RFID tags, sensors, and small IoT devices. Significant for providing security on devices with limited computational resources.

StarStarStarStar

Cryptographic Salt

StarStarStarStar

Random data that is used as an additional input to a one-way function that hashes a password or passphrase. Significant for enhancing security by preventing dictionary and rainbow table attacks.

StarStarStarStar

Steganography

StarStarStarStar

The practice of concealing messages or information within other non-secret text or data. Significant as a covert communication method to hide the existence of a message altogether as opposed to traditional encryption that hides the content of the message.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.