Basic Cryptography Lecture Notes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

This set of flashcards covers the fundamental concepts and terminology related to basic cryptography, including security models, encryption methods, and key concepts in cryptographic practices.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

CIA Model

The classic security model which stands for confidentiality, integrity, and availability.

2
New cards

Confidentiality

Information is only disclosed to those authorized to know it.

3
New cards

Integrity

Only authorized parties can modify information in allowed ways.

4
New cards

Availability

Authorized individuals are not prevented from accessing information.

5
New cards

Cryptography

The practice of securing information and communications through the use of codes.

6
New cards

Encryption

The process of converting plain text into cipher text to protect information.

7
New cards

Decryption

The process of converting cipher text back into plain text.

8
New cards

Symmetric Key Cryptography

A type of cryptography where the same key is used for both encryption and decryption.

9
New cards

Asymmetric Key Cryptography

A type of cryptography that uses a public key for encryption and a private key for decryption.

10
New cards

Cryptographic Hash Function

A function that takes an arbitrary length message and produces a fixed size hash value.

11
New cards

One-way function

A function that is easy to compute in one direction but hard to reverse.

12
New cards

Weak Collision Resistance

It should be hard to find a different input that hashes to the same output.

13
New cards

Strong Collision Resistance

It should be hard to find any two different inputs that hash to the same output.

14
New cards

AES

Advanced Encryption Standard; a widely used symmetric encryption algorithm.

15
New cards

RSA

Rivest-Shamir-Adleman; a widely used asymmetric encryption algorithm.

16
New cards

Digital Signature

A cryptographic scheme that joins hashing and public key cryptography to verify a message's authenticity.

17
New cards

Digital Certificate

A document that uses a digital signature to verify the ownership of a public key.

18
New cards

Chain of Trust

A trust model that relies on the security of public keys and the verification process in certificate authorities.

19
New cards

SSH Authentication

A secure method of logging into a remote server using public key cryptography.

20
New cards

MD5

A cryptographic hash function that is no longer considered secure due to vulnerabilities.

21
New cards

SHA-256

A cryptographic hash function that produces a 256-bit hash and is currently considered secure.