CMSC 426 Lecture 6

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 15

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

16 Terms

1

Asymmetric encryption

Encryption method that utilizes a pair of keys: a public key for encrypting data and a private key for decrypting it.

New cards
2

RSA

A prominent asymmetric encryption algorithm named after its developers: Rivest, Shamir, and Adleman.

New cards
3

RSA key generation steps

  1. Select two secret prime numbers, p and q.

  2. Calculate n = p × q and ϕ(n) = (p-1) × (q-1).

  3. Choose a public exponent e.

  4. Derive the private exponent d.

New cards
4

RSA public and private keys

The public key is represented as (n, e) while the private key is expressed as (n, d).

New cards
5

Encryption in RSA

To encrypt a message m, use the formula c = m^e mod n.

New cards
6

Decryption in RSA

To decrypt, perform the calculation m = c^d mod n.

New cards
7

Elliptic Curve Cryptography (ECC)

An asymmetric cryptographic technique based on elliptic curves, providing robust security with smaller key sizes.

New cards
8

Message Authentication Code (MAC)

A short segment of data attached to a message to confirm its integrity and authenticity using a shared secret key.

New cards
9

Digital signatures

Cryptographic signatures that utilize private key encryption to validate a message's authenticity.

New cards
10

HMAC

Hash-based Message Authentication Code that employs a cryptographic hash function alongside a secret key to guarantee message integrity and authenticity.

New cards
11

Public Key Infrastructure (PKI)

A system for overseeing digital certificates, public keys, and their revocation.

New cards
12

X.509 certificates

Digital certificates that link a public key to a specific entity, encompassing identifying details and a digital signature from a Certificate Authority (CA).

New cards
13

Chain of trust

A structured hierarchy within PKI where a trusted root CA signs intermediate certificates, which in turn sign end-entity certificates.

New cards
14

Self-signed certificates

Certificates that are issued and signed by the same entity, typically used in testing or internal networks.

New cards
15

Key exchange

The method of securely distributing cryptographic keys between parties using asymmetric encryption.

New cards
16

What does an SSL certificate demo typically illustrate?

An SSL certificate demo shows how a website’s digital certificate is used to establish an encrypted connection (HTTPS), verifying the site’s identity and securing data in transit.

New cards

Explore top notes

note Note
studied byStudied by 1 person
62 days ago
5.0(1)
note Note
studied byStudied by 8 people
749 days ago
5.0(1)
note Note
studied byStudied by 4 people
837 days ago
5.0(1)
note Note
studied byStudied by 517 people
167 days ago
4.5(2)
note Note
studied byStudied by 55 people
707 days ago
5.0(1)
note Note
studied byStudied by 17 people
938 days ago
5.0(1)
note Note
studied byStudied by 2466 people
702 days ago
5.0(7)

Explore top flashcards

flashcards Flashcard (78)
studied byStudied by 23 people
292 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 210 people
679 days ago
5.0(4)
flashcards Flashcard (81)
studied byStudied by 78 people
550 days ago
5.0(2)
flashcards Flashcard (34)
studied byStudied by 58 people
562 days ago
5.0(2)
flashcards Flashcard (33)
studied byStudied by 13 people
839 days ago
5.0(2)
flashcards Flashcard (104)
studied byStudied by 8 people
33 days ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 21 people
847 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 248 people
44 days ago
5.0(1)
robot