1/15
Flashcards covering key vocabulary and concepts related to cryptographic primitives and their applications in blockchain technology.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Public Key Cryptography
Cryptography that uses two keys, a public key for encryption and a private key for decryption.
Digital Signature
A digital code attached to a document to verify its authenticity and integrity.
RSA
A public key cryptosystem that enables secure data transmission and relies on the difficulty of factoring large integers.
Symmetric Key Cryptography
A type of cryptography where the same key is used for both encryption and decryption.
Hash Function
A function that converts an input into a fixed-size string of bytes, typically used for data integrity.
Public Key
A cryptographic key that can be shared with everyone and is used for encrypting messages.
Private Key
A secret key known only to the owner, used for decrypting messages encoded with the corresponding public key.
Non-repudiation
A feature that prevents an entity from denying the authenticity of their signature on a document.
Cryptographically Secure Hash Function
A hash function that is secure against collisions, ensuring that two different inputs cannot produce the same hash output.
Key Generation
The process of generating keys for encryption and decryption in cryptography.
Asymmetric Cryptography
Another term for public key cryptography, which utilizes pairs of keys for encryption and decryption.
Collusion Free
A property of cryptographic systems that ensures the scheme remains secure even if some users conspire against it.
Merkle Tree
A data structure that allows for the efficient and secure verification of content in blockchain.
Puzzle Friendly
A design requirement for cryptographic systems that makes solving puzzles necessary for certain operations.
Digital Signature Algorithm (DSA)
A standard for digital signatures that ensures data integrity and the authenticity of a sender.
Elliptic Curve Digital Signature Algorithm (ECDSA)
A variant of DSA that uses elliptic curves for improved security.