Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptography Fundamentals

20

Flashcards

0/20

Still learning
StarStarStarStar

Cryptanalysis

StarStarStarStar

The art and science of analyzing information systems in order to study the hidden aspects of the systems. It’s used to breach cryptographic security systems and gain access to the contents of encrypted messages.

StarStarStarStar

Message Authentication Code (MAC)

StarStarStarStar

A short piece of information used to authenticate a message and to provide integrity and authenticity assurances. MAC values are computed using a secret key.

StarStarStarStar

DES (Data Encryption Standard)

StarStarStarStar

A once widely used symmetric key algorithm for the encryption of electronic data, standardized by NIST. It has been superseded by AES due to its vulnerability to brute-force attacks.

StarStarStarStar

Quantum Cryptography

StarStarStarStar

The use of quantum mechanical properties to perform cryptographic tasks. The most famous example is Quantum Key Distribution (QKD), which provides secure communication by leveraging quantum entanglement.

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A framework for managing digital certificates and public key encryption, enabling secure data transfer, authentication, and digital signatures over the internet.

StarStarStarStar

AES (Advanced Encryption Standard)

StarStarStarStar

A symmetric key encryption algorithm chosen by the U.S. government to protect classified information, and is implemented in software and hardware worldwide to encrypt sensitive data.

StarStarStarStar

RSA Encryption

StarStarStarStar

An asymmetric cryptographic algorithm based on the practical difficulty of factoring the product of two large prime numbers, used for secure data transmission.

StarStarStarStar

Nonce

StarStarStarStar

An arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure freshness of the message.

StarStarStarStar

Steganography

StarStarStarStar

The practice of concealing messages or information within other non-secret text or data. It’s different from cryptography, which obscures the meaning of a message, but not the existence of the message itself.

StarStarStarStar

One-Time Pad (OTP)

StarStarStarStar

A symmetric key encryption technique where the plaintext is combined with a secret random key. It is the only encryption method that is proven to be unbreakable when used correctly.

StarStarStarStar

Digital Signature

StarStarStarStar

A mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe the message was created by a known sender.

StarStarStarStar

Asymmetric Key Cryptography

StarStarStarStar

Utilizes a pair of keys – a public key and a private key – for encryption and decryption. The public key encrypts data, while the private key decrypts it, facilitating secure communication over insecure channels.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

An approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields, offering smaller key sizes compared to traditional methods like RSA.

StarStarStarStar

Stream Cipher

StarStarStarStar

A cipher that encrypts plaintext digits one at a time, and the transformation of successive digits varies during the encryption process. It's used for cases like secure wireless communication.

StarStarStarStar

Symmetric Key Cryptography

StarStarStarStar

A type of encryption where the same key is used for both encryption and decryption of the data. Commonly used for its speed in systems where data is large and secure key exchange is possible.

StarStarStarStar

Hash Functions

StarStarStarStar

A cryptographic algorithm that converts data of any size into a fixed-size string of characters, which acts as a digital fingerprint of the data. Used for verifying data integrity and in various authentication processes.

StarStarStarStar

Diffie-Hellman Key Exchange

StarStarStarStar

A method of securely exchanging cryptographic keys over a public channel, using the discrete logarithm problem for security. It was one of the first public-key protocols.

StarStarStarStar

Salt

StarStarStarStar

Random data that is used as an additional input to a hash function that hashes a password or passphrase. Its primary function is to defend against dictionary attacks and rainbow table attacks.

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An entity that issues digital certificates certifying the ownership of a public key by the named entity of the certificate. These certificates are used in PKI to establish trust between parties.

StarStarStarStar

Block Cipher

StarStarStarStar

A deterministic algorithm operating on fixed-size groups of bits, called blocks, with an unvarying transformation specified by a symmetric key. It's a common mode of operation in cryptographic systems.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.