1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Asymmetric Encryption
A cryptographic technique that uses two mathematically related but different keys: a public key for encryption and a private key for decryption to secure digital communication.
RSA (Rivest-Shamir-Adleman)
A widely used asymmetric encryption algorithm that relies on large prime numbers. It uses a public key to encrypt data and a private key to decrypt it, ensuring strong security.
DSA (Digital Signature Algorithm
An asymmetric algorithm mainly used for digital signatures and key exchange. It verifies authenticity and ensures data integrity.
ECDSA (Elliptic Curve Digital Signature Algorithm)
A version of DSA that uses elliptic curve cryptography to create efficient and secure digital signatures, especially useful for devices with limited resources.
ElGamal
An asymmetric encryption algorithm used for both encryption and digital signatures, supporting secure communication and authentication.
Diffie-Hellman (DH/DHKE)
A key exchange algorithm that allows two parties to securely create a shared secret key over an untrusted network without directly sending the key.
ECDH (Elliptic Curve Diffie-Hellman)
A version of Diffie-Hellman that uses elliptic curve cryptography for faster and more efficient secure key exchange, especially in constrained environments.