Explore tens of thousands of sets crafted by our community.
Cryptography Fundamentals
20
Flashcards
0/20
Cryptanalysis
The art and science of analyzing information systems in order to study the hidden aspects of the systems. It’s used to breach cryptographic security systems and gain access to the contents of encrypted messages.
Message Authentication Code (MAC)
A short piece of information used to authenticate a message and to provide integrity and authenticity assurances. MAC values are computed using a secret key.
DES (Data Encryption Standard)
A once widely used symmetric key algorithm for the encryption of electronic data, standardized by NIST. It has been superseded by AES due to its vulnerability to brute-force attacks.
Quantum Cryptography
The use of quantum mechanical properties to perform cryptographic tasks. The most famous example is Quantum Key Distribution (QKD), which provides secure communication by leveraging quantum entanglement.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public key encryption, enabling secure data transfer, authentication, and digital signatures over the internet.
AES (Advanced Encryption Standard)
A symmetric key encryption algorithm chosen by the U.S. government to protect classified information, and is implemented in software and hardware worldwide to encrypt sensitive data.
RSA Encryption
An asymmetric cryptographic algorithm based on the practical difficulty of factoring the product of two large prime numbers, used for secure data transmission.
Nonce
An arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure freshness of the message.
Steganography
The practice of concealing messages or information within other non-secret text or data. It’s different from cryptography, which obscures the meaning of a message, but not the existence of the message itself.
One-Time Pad (OTP)
A symmetric key encryption technique where the plaintext is combined with a secret random key. It is the only encryption method that is proven to be unbreakable when used correctly.
Digital Signature
A mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe the message was created by a known sender.
Asymmetric Key Cryptography
Utilizes a pair of keys – a public key and a private key – for encryption and decryption. The public key encrypts data, while the private key decrypts it, facilitating secure communication over insecure channels.
Elliptic Curve Cryptography (ECC)
An approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields, offering smaller key sizes compared to traditional methods like RSA.
Stream Cipher
A cipher that encrypts plaintext digits one at a time, and the transformation of successive digits varies during the encryption process. It's used for cases like secure wireless communication.
Symmetric Key Cryptography
A type of encryption where the same key is used for both encryption and decryption of the data. Commonly used for its speed in systems where data is large and secure key exchange is possible.
Hash Functions
A cryptographic algorithm that converts data of any size into a fixed-size string of characters, which acts as a digital fingerprint of the data. Used for verifying data integrity and in various authentication processes.
Diffie-Hellman Key Exchange
A method of securely exchanging cryptographic keys over a public channel, using the discrete logarithm problem for security. It was one of the first public-key protocols.
Salt
Random data that is used as an additional input to a hash function that hashes a password or passphrase. Its primary function is to defend against dictionary attacks and rainbow table attacks.
Certificate Authority (CA)
An entity that issues digital certificates certifying the ownership of a public key by the named entity of the certificate. These certificates are used in PKI to establish trust between parties.
Block Cipher
A deterministic algorithm operating on fixed-size groups of bits, called blocks, with an unvarying transformation specified by a symmetric key. It's a common mode of operation in cryptographic systems.
© Hypatia.Tech. 2024 All rights reserved.