1/23
meow
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Non-repudiation
proving a user performed an action
crypto constraints
speed, size, key length, weak keys, longevity, predictability, reuse, computational overhead
OTP
One time pad
MD
Message digest
SHA
Secure Hash Algorithm
RIPeMD
RACE integrity primitive evaluation.
symmetric
same key for encrypting and decrypting
DES
Data encryption standard
3DES
Triple Data Encryption standard
AES
Advanced encryption system
RC
Rivest cipher
blowfish
operates on 64 blocks, key is 32-448 bits
asymmetric
2 keys, public and private.
RSA
Multiplies 2 large prime numbers
ECC
ecliptic curve cryptography
DSA
Digital signature algorithm
DH
Diffie hellman
downgrade attack
forces the system to fall back on less secure mode
collision attack
find 2 input strings of hash alg that produces the same hash
EFS
encrypting file system
fde
full disk encryption
fed
full encrypting drives
hsm
hardware security module
tpm
trusted platform module