Week 4: Public Key Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:44 AM on 1/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

Asymmetric Encryption

A cryptographic system that uses a pair of keys: a public key for encryption and a private key for decryption.

2
New cards

Public Key

A key that is shared openly. Anyone can use it to encode a message, but only the holder of the corresponding private key can decode it.

3
New cards

Computational Security

The concept that a cryptosystem is secure if breaking it would require more computational resources than are available to an adversary.

4
New cards

Trapdoor One-Way Function

A function that is easy to compute in one direction but hard to reverse, unless you have secret information (the 'trapdoor'). It is key to asymmetric cryptography

5
New cards

RSA

A widely used public-key cryptography system that relies on the difficulty of factoring large numbers.

6
New cards

Euler's Totient Function

A function that counts the positive integers up to a given integer n that are coprime to n.

7
New cards

Digital Signatures

An asymmetric cryptographic technique that provides authenticity and integrity by allowing a sender to sign a message in a way that can be verified by anyone.

8
New cards

Public-Key Infrastructure

A framework of hardware, software, policies, and procedures needed to manage digital signatures and public-key cryptography.

9
New cards

X.509

A standard defining the format of public key certificates used in PKI.

10
New cards

Elliptic Curve Cryptography (ECC)

A form of public-key cryptography based on elliptic curves, offering the same security with smaller keys compared to RSA.