Section 8 (Cryptography)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Symmetric encryption

Uses one shared key for both encryption and decryption

2
New cards

Asymmetric encryption

Uses a key pair: one public key to encrypt, one private key to decrypt

3
New cards

Public key

Used to encrypt data in asymmetric encryption

4
New cards

Private key

Used to decrypt data in asymmetric encryption

5
New cards

RSA

Common asymmetric encryption algorithm used for secure data transmission

6
New cards

ECC (Elliptic Curve Cryptography)

Asymmetric encryption offering similar security with smaller keys

7
New cards

DES (Data Encryption Standard)

Old symmetric encryption standard, now considered insecure

8
New cards

AES (Advanced Encryption Standard)

Strong symmetric encryption standard used globally

9
New cards

Hashing

One-way function that converts data into a fixed-length string

10
New cards

MD5

Hash algorithm now considered broken due to vulnerabilities

11
New cards

SHA (Secure Hash Algorithm)

Common hashing family; SHA-2 is widely used and secure

12
New cards

HMAC

Hash-based Message Authentication Code; provides data integrity and authenticity

13
New cards

Digital signature

Uses private key to sign a message and public key to verify identity and integrity

14
New cards

Salting

Adding random data to inputs before hashing to prevent rainbow table attacks

15
New cards

Key stretching

Strengthens weak passwords by hashing them multiple times

16
New cards

Birthday attack

Exploits the likelihood of two hashes producing the same output (collision)

17
New cards

Collision attack

Two different inputs result in the same hash output

18
New cards

PKI (Public Key Infrastructure)

System for issuing and managing digital certificates and public keys

19
New cards

Certificate

A digital file that verifies the identity of the certificate holder

20
New cards

Wildcard certificate

Covers all subdomains of a domain (e.g., *.example.com)

21
New cards

Self-signed certificate

Signed by the creator instead of a trusted Certificate Authority

22
New cards

CSR (Certificate Signing Request)

Request sent to a CA to obtain a digital certificate

23
New cards

Root of trust

Trusted entity at the top of the certificate chain hierarchy

24
New cards

CRL (Certificate Revocation List)

List of certificates revoked by a CA before expiration

25
New cards

OCSP (Online Certificate Status Protocol)

Real-time method to check certificate revocation status

26
New cards

Blockchain

Distributed, immutable digital ledger technology

27
New cards

Open public ledger

Public record of transactions viewable by anyone, used in blockchains

28
New cards

TPM (Trusted Platform Module)

Hardware chip that provides secure cryptographic functions

29
New cards

HSM (Hardware Security Module)

Secure hardware device for managing digital keys and crypto operations

30
New cards

Secure enclave

Isolated, secure area of a processor for protecting sensitive data