Encryption Acronyms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

RSA

Rivest–Shamir–Adleman

2
New cards

ECC

Elliptic Curve Cryptography

3
New cards

DH

Diffie Hellman

4
New cards

DHE / EDH

Diffie Hellman Ephemeral / Ephemeral DH

5
New cards

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral

6
New cards

PGP

Pretty Good Privacy

7
New cards

GPG

GNU Privacy Guard

8
New cards

TLS

Transport Layer Security

9
New cards

SSL

Secure Sockets Layer

10
New cards

MD5

Message Digest 5

11
New cards

SHA-1

Secure Hash Algorithm 1

12
New cards

SHA-2

Secure Hash Algorithm 2

13
New cards

SHA-256

SHA-2 variant

14
New cards

SHA-3

Secure Hash Algorithm 3

15
New cards

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

16
New cards

HMAC

Hash-Based Message Authentication Code

17
New cards
AES
Advanced Encryption Standard
18
New cards
DES
Data Encryption Standard
19
New cards
3DES
Triple Data Encryption Std.
20
New cards
RC4
Rivest Cipher 4
21
New cards
Symmetric encryption
Faster, uses the same key to encrypt/decrypt (e.g., AES)
22
New cards
Asymmetric encryption
Uses public/private key pairs (e.g., RSA, ECC).
23
New cards
Key exchange
Often uses Diffie-Hellman or ECDHE to securely share symmetric keys.
24
New cards
Hybrid systems
Combine symmetric for speed and asymmetric for secure key delivery (e.g., PGP, TLS).
25
New cards
Hashing
cannot be reversed, ensures data integrity (i.e., the data wasn’t changed)
26
New cards
Hash collisions
when two different inputs produce the same hash — a major security flaw.
27
New cards
What 2 Hashing algorithyms do we not use anymore?
MD5 and SHA-1 are deprecated due to known collision vulnerabilities.
28
New cards
What hashing algorithyms are used in modern standard secure systems today?
SHA-2 and SHA-256
29
New cards
What is so important about HMAC
This uses a key + hashing algorithm (like HMAC-SHA256) to verify both integrity and authenticity
30
New cards
What hashing algorithyms do Digital certificates use?
SHA-256 (part of SHA-2 family)
31
New cards
What hashing algorithyms do API integrity checks use?
HMAC
32
New cards
What hashing algorithyms do Legacy systems use and we should avoid?
MD5, SHA-1
33
New cards
What hashing algorithyms do Modern secure apps use?
SHA-2, HMAC