1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Public Key Cryptography
A cryptographic system that uses pairs of keys: a public key, which can be shared openly, and a private key, which is kept secret by the owner.
Digital Signatures
A mathematical scheme for verifying the authenticity and integrity of a message, signable only with a private key, but verifiable by anyone with the corresponding public key.
Man-in-the-Middle (MITM) Attack
A security breach where a third party intercepts and potentially alters communication between two parties who believe they are directly communicating with each other.
Certificate Authority (CA)
A trusted entity that issues digital certificates for use in public key cryptography, verifying the ownership of public keys.
Certificate
A document that confirms the ownership of a public key and is issued by a Certificate Authority.
Hierarchical Trust
A system where trust is delegated down a chain from a trust anchor or root certificate authority to subordinate authorities or certificates.
Public Key Infrastructure (PKI)
A framework that provides the necessary services to create, manage, distribute, and revoke digital certificates.
Session Key
A temporary symmetric key used for encrypting messages between a client and server during a single session, established after the TLS handshake.
Transport Layer Security (TLS)
A cryptographic protocol designed to provide communications security over a computer network, ensuring encryption, integrity, and authentication.
SSLstrip Attack
A type of attack that forces a user to connect to an unsecured HTTP version of a site, thus bypassing HTTPS security.
Confidentiality
A security principle ensuring that information is accessible only to those authorized to have access.
Integrity
The assurance that the information being transferred has not been altered during transmission.
Authentication
Verifying the identity of a person or device, often using cryptographic techniques such as digital signatures.
Non-Repudiation
A guarantee that someone cannot deny the validity of their signature on a document or a message.
Enciphered Text
Text that has been transformed into a cipher to prevent unauthorized access.
RSA
A widely used asymmetric encryption algorithm that relies on the mathematical difficulty of factoring large numbers.
Key Exchange Algorithm
A method by which cryptographic keys are exchanged between users, ensuring secure communication.
Symmetric Encryption
An encryption method where the same key is used for both encryption and decryption.
Asymmetric Encryption
An encryption method where different keys are used for encryption (public key) and decryption (private key).
Denial of Service Attack
An attempt to make a machine or network resource unavailable to its intended users by overwhelming it with requests.