1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Encryption
Is the process of converting readable data (plaintext) into unreadable form (ciphertext) to protect confidentiality.
plaintext
readable data
unreadable
ciphertext
Decryption
Only someone with the correct key can convert the ciphertext back to plaintext
1. Symmetric Encryption
2. Asymmetric Encryption
Major types of Encryption
Symmetric Encryption
Same key used to encrypt & decrypt
Assymetric Encryption
Uses public & private key pair
Caesar Cipher (Classical Encryption)
Shifts every letter by a fixed number.
Example: Shift = 2
A → C
B → D
Y →A
AES (Advanced Encryption Standard)
Industry standard, very secure.
128
192
256
Key sizes of AES
1. WIFI
2. VPN
2. SSL / TSL
Advanced Encryption Standard (AES) is widely used in:
1. Public Key
2. Private Key
Assymetric Encryption uses two keys:
1. Digital Signatures
2. Secure websties
3. Email Encryption
Assymetric Encryption is widely used in:
RSA Encryption (Rivest-Shamir-Adleman)
Mathematical algorithm using large prime numbers.
Very secure but slower than AES. (Advance Encryption Standard)
Hashing
Irreversible (cannot be decrypted)
One way encryption
1. Password Storage
2. Integrity Checking
3. Digital Signatures
Hashing is used in:
1. MD5 (not secure) (Message Digest Algorithm 5)
2. SHA-1 (not secure)
3. SHA 256 (recommended)
What are the Popular Hash Functions:
MD5 (not secure) - Message Digest Algorithm 5
Is a cryptographic hash function that produces a 128-bit hash value, usually shown as a 32-character hexadecimal string.
SHA-1 (not secure)
It is a cryptographic hash function that produces a 160-bit (40 character) hexadecimal hash from any input data.
SHA-256(bit)
Is a cryptographic hash function from the SHA-2 family. It produces a 256-bit hash value, usually shown as a 64-character hexadecimal string.
Secure Hash Algorithm
Meaning of SHA