Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptographic Standards and Protocols

29

Flashcards

0/29

Still learning
StarStarStarStar

X.509

StarStarStarStar

Purpose: To standardize public key certificates. Application: Used in SSL/TLS and other systems that require a reliable authentication method for keys used in asymmetric cryptography.

StarStarStarStar

ECC (Elliptic Curve Cryptography)

StarStarStarStar

Purpose: To provide the same level of security as RSA but with smaller key sizes. Application: Used in mobile devices, smart cards, and wireless security (e.g., Bluetooth).

StarStarStarStar

IKE (Internet Key Exchange)

StarStarStarStar

Purpose: To handle negotiation of protocols and algorithms and to establish authentication keys. Application: Used in the set-up to secure an IPsec VPN connection.

StarStarStarStar

TLS (Transport Layer Security)

StarStarStarStar

Purpose: To provide secure communications over a computer network. Application: Used for secure web browsing, email privacy, secure voice-over-IP, and more.

StarStarStarStar

OpenSSL

StarStarStarStar

Purpose: To implement the TLS and SSL protocols. Application: Used for secure communication over networks and for cryptographic functions.

StarStarStarStar

OCSP (Online Certificate Status Protocol)

StarStarStarStar

Purpose: To check the revocation status of an X.509 digital certificate. Application: Used to maintain the security of a server and other network resources.

StarStarStarStar

3DES (Triple Data Encryption Standard)

StarStarStarStar

Purpose: To improve the security of DES by applying it three times. Application: Used in situations where DES was previously implemented but needed a security upgrade.

StarStarStarStar

SSL (Secure Socket Layer)

StarStarStarStar

Purpose: To establish encrypted links between a web server and a browser. Application: Though outdated and succeeded by TLS, it is still a term used to describe secure web connections.

StarStarStarStar

Kerberos

StarStarStarStar

Purpose: To authenticate service requests between trusted hosts across an untrusted network. Application: Used in secure network authentication, commonly in client-server environments.

StarStarStarStar

Diffie-Hellman key exchange

StarStarStarStar

Purpose: To securely exchange cryptographic keys over a public channel. Application: Used in setting up secure communications channels like those in VPNs and SSH.

StarStarStarStar

CBC (Cipher Block Chaining)

StarStarStarStar

Purpose: To make block ciphers more secure by adding a feedback mechanism. Application: Used in algorithms like AES and DES to provide message confidentiality.

StarStarStarStar

GCM (Galois/Counter Mode)

StarStarStarStar

Purpose: To provide assurance of the authenticity and integrity of data along with confidentiality. Application: Primarily used in disk encryption, database encryption, and TLS.

StarStarStarStar

IPsec (Internet Protocol Security)

StarStarStarStar

Purpose: To secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet. Application: Widely used in VPNs and secure network communications.

StarStarStarStar

OpenPGP

StarStarStarStar

Purpose: To encrypt and decrypt data, providing cryptographic privacy and authentication. Application: Standardization of PGP encryption to allow interoperability of products.

StarStarStarStar

FIDO (Fast Identity Online)

StarStarStarStar

Purpose: To provide strong authentication using public key cryptography. Application: Used for passwordless login and as a second factor in two-factor authentication systems.

StarStarStarStar

ECDSA (Elliptic Curve Digital Signature Algorithm)

StarStarStarStar

Purpose: To provide a digital signature mechanism for authentication. Application: Used in environments that require strong security with smaller key sizes, such as smart cards and mobile devices.

StarStarStarStar

DRBG (Deterministic Random Bit Generator)

StarStarStarStar

Purpose: To produce a sequence of bits from an initial seed value that is statistically random. Application: Essential for creating cryptographic keys in various cryptographic applications.

StarStarStarStar

AES (Advanced Encryption Standard)

StarStarStarStar

Purpose: To secure data by encrypting it in a fast and efficient manner. Application: Used widely in SSL/TLS for web security, file encryption, VPNs, and government communications.

StarStarStarStar

PGP (Pretty Good Privacy)

StarStarStarStar

Purpose: To encrypt and decrypt emails and files, ensuring their privacy and authentication. Application: Used in personal and corporate email encryption.

StarStarStarStar

DES (Data Encryption Standard)

StarStarStarStar

Purpose: To encrypt electronic data using symmetric cryptography. Application: Its usage has been largely historical since it was replaced by AES.

StarStarStarStar

MD5 (Message Digest Algorithm 5)

StarStarStarStar

Purpose: To produce a hash value and ensure data integrity. Application: Now considered insecure, it was previously used in checksums, fingerprints, and HMACs.

StarStarStarStar

PGP/GPG (GNU Privacy Guard)

StarStarStarStar

Purpose: To securely encrypt and sign data and communication. Application: Used as a free software alternative to the original PGP software and compatible with the OpenPGP standard.

StarStarStarStar

CRL (Certificate Revocation List)

StarStarStarStar

Purpose: To list certificates that are no longer trusted because they were revoked. Application: Used in environments where it is critical to know whether a certificate has been compromised.

StarStarStarStar

RSA (Rivest–Shamir–Adleman)

StarStarStarStar

Purpose: To secure sensitive data transmission. Application: Public key encryption and digital signatures used in applications such as secure email and software distribution.

StarStarStarStar

HMAC (Hash-based Message Authentication Code)

StarStarStarStar

Purpose: To verify data integrity and authenticity of a message. Application: Used in data transmission like API security and securing data in motion.

StarStarStarStar

S/MIME (Secure/Multipurpose Internet Mail Extensions)

StarStarStarStar

Purpose: To secure email through encryption and digital signatures. Application: Used in email clients like Outlook and Thunderbird to securely exchange emails.

StarStarStarStar

SHA (Secure Hash Algorithm)

StarStarStarStar

Purpose: To generate a unique, fixed-size hash from data. Application: Used in digital signatures, password storage, and data integrity verification.

StarStarStarStar

ECDH (Elliptic Curve Diffie-Hellman)

StarStarStarStar

Purpose: An improved version of Diffie-Hellman using elliptic curves for smaller key sizes and faster computation. Application: Used in protocols requiring secure key exchange with efficient performance.

StarStarStarStar

CTR (Counter Mode)

StarStarStarStar

Purpose: To operate a block cipher in stream cipher mode. Application: Provides high-speed cryptography with lower latency and is used in AES-CTR.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.