Week 4: Public Key Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

Asymmetric Encryption

A cryptographic system that uses a pair of keys: a public key for encryption and a private key for decryption.

2
New cards

Public Key

A key that is shared openly. Anyone can use it to encode a message, but only the holder of the corresponding private key can decode it.

3
New cards

Computational Security

The concept that a cryptosystem is secure if breaking it would require more computational resources than are available to an adversary.

4
New cards

Trapdoor One-Way Function

A function that is easy to compute in one direction but hard to reverse, unless you have secret information (the 'trapdoor'). It is key to asymmetric cryptography

5
New cards

RSA

A widely used public-key cryptography system that relies on the difficulty of factoring large numbers.

6
New cards

Euler's Totient Function

A function that counts the positive integers up to a given integer n that are coprime to n.

7
New cards

Digital Signatures

An asymmetric cryptographic technique that provides authenticity and integrity by allowing a sender to sign a message in a way that can be verified by anyone.

8
New cards

Public-Key Infrastructure

A framework of hardware, software, policies, and procedures needed to manage digital signatures and public-key cryptography.

9
New cards

X.509

A standard defining the format of public key certificates used in PKI.

10
New cards

Elliptic Curve Cryptography (ECC)

A form of public-key cryptography based on elliptic curves, offering the same security with smaller keys compared to RSA.