1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
algorithm
A step-by-step set of rules used to perform encryption or decryption.
asymmetric encryption
A type of encryption that uses a pair of keys: one for encryption (public key) and one for decryption (private key).
authentication
The process of verifying the identity of a person or system before granting access.
cipher
An algorithm for performing encryption or decryption.
ciphertext
Encrypted data that has been transformed using a cipher.
cryptography
The science of protecting information by transforming it into unreadable formats, and then back again.
cryptanalysis
The study and practice of breaking encrypted codes without knowing the key.
data integrity
Ensuring that data has not been changed or tampered with during transmission or storage.
decryption
The process of converting encrypted data back into its original, readable form.
digital certificate
An electronic document used to prove ownership of a public key, typically issued by a trusted Certificate Authority (CA).
digital signature
A secure digital code attached to a message or document that proves it came from a specific sender and hasn't been altered.
encryption
The process of converting information into a secret code to protect it from unauthorized access.
end-to-end encryption
A secure communication method that ensures only the sender and the recipient can read the messages.
hashing
A process that converts data into a fixed-length value or string, typically used for storing passwords securely.
key
A string of data used by a cipher to encrypt or decrypt information.
key management
The process of handling encryption keys, including their creation, exchange, storage, and disposal.
one-time pad
An extremely secure encryption method that uses a single-use random key as long as the message itself.
plaintext
Original, unencrypted data (e.g., a message, document, or file).
private key
A key used in asymmetric encryption to decrypt messages, kept secret by the receiver.
public key
A key used in asymmetric encryption that is shared publicly to encrypt messages.
symmetric encryption
A type of encryption where the same key is used for both encryption and decryption.