1/22
Cryptography
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cryptography
The idea of alternating data to make it unintelligible to unauthorized parties.
Plaintext
The encrypted data after is it decrypted or the the data that is unencrypted but about to be encrypted.
Ciphertext
Data that has been enciphered and cannot be read without the cipher key
Algorithim
AKA a cipher, the operation that transforms plaintext to ciphertext
Cryptanalysis
The science and art associated with breaking codes and ciphers.
Encryption
Scrambling the characters used in a message so that message can be seen but not understood or modified.
A secure way of transmitting data and authenticating users.
A way to store data more securely
Key
A specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption.
Symmetric encryption
AKA Shared-key encryption. 2-way encryption and decryption where they both have the same key.
Key length
The size of the cryptographic key in bits. The longer the key the better the security.
Asymmetric algorithm
Cipher that uses public and private keys. The private key is not derivable from the public key. Cannot reverse the operation it performs (ie. a public key cannot decrypt what it has encrypted)
Mathematically linked.
Public key
During asymmetric encryption, it is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.’
More easily: same key used to unlock/locl
Private key
In asymmetric encryption, this key is only known to the holder. Not derivable from the public key.
Can be used to encrypt data that can be decrypted by the linked public key. VV
more easily: One key to lock, a different key to unlock
Blockchain
A concept where an expanding list of transactional records listed in a public ledger are secured using cryptography.
Open public ledger
Underpins the integrity of blockchains. Distributed public records of transactions.
Steganography
The practice of concealing a file, message, image or video within another file, message, image, or video.
Hashing
Is the process of converting one value into another.
2 messages will have different hashing values.
Salting a hash
Adding a random number to the data being hashed before the hash. Randomly determined each time.
Ephemeral Keys
Used with messaging because each message has a new key associated with it.
Hybrid Cryptosystems
Combines the efficiency of symmetric encryption with the convenience of asymmetric encryptionnum.
Stream Cipher
Symmetric encryption method. Encryption one bit at a time. Key is the same length as the data.
Block Ciphers
Encrypted one block at a time.
Lightweight Cryptography
Standardized encryption algorithms meant to be used on IoT devices.
Homomorphic Encryption
Allows the data to be worked on without decrypting it first.