1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Cryptography
Practice and study of writing and solving codes
Encryption to hide informations true meaning
Encryption
Converts plain text in to ciphertext
Provides data encryption in use in transit and at rest
Data states
Data at rest = in active data on storage devices
Data in transit = moving across networks
Data in use = currently undergoing data
Alghoritm and key
Alghoritm = performs encryption and decryption
Key = essential for determining cipher output
Key length and rotation
Key length = proportional to security
Key rotation = best practice for security longevity
Symetric alghoritms
DES
Triple DES
IDEA
AES
Blowfish
Twofish
Rivest cipher
Asymmetric encryption
Diffie Hellman
RSA
Elliptic curve cryptography
Hashing alghoritm
Md5
Sha family
RIPEMD
HMAC
Public key infrastructure PKI
Framework for managing keys and certificates for secure data transfer