2.8 Flashcards
Summarize the basics of cryptographic concepts.
Is a cryptographic implementation designed to demonstrate authenticity and identity associated with a message.
Digital signatures
As a general rule, a longer key length is more secure, but also will take longer to compute.
Key length
Is a mechanism that takes what would be weak keys and “stretches” them to make the system more secure against brute force attacks.
Key stretching
The level of randomness.
Entropy
Refers to the process of adding random data to plaintext before it is hashed. This technique is commonly used in password hashing to enhance security and mitigate various attacks.
Salting
Is a special mathematical function that performs one-way encryption, which means that once the algorithm is processed, there is no feasible way to use the ciphertext to retrieve the plaintext that was used to generate it.
Hashing function
Is a fundamental concept in cryptography that involves securely establishing a shared secret key between two parties over an insecure communication channel. This shared key can then be used to encrypt and decrypt messages exchanged between the parties, ensuring confidentiality and integrity of communication.
Key exchange
Is a branch of public key cryptography that relies on the algebraic structure of elliptic curves over finite fields to provide security functions. It is widely used for secure communication, digital signatures, and encryption.
Elliptic-curve cryptography (ECC)
Is a property of a public key system in which a key derived from another key is not compromised, even if the originating key is compromised in the future.
Perfect forward secrecy (PFS)
Is the use of quantum computing hardware to perform encryption and decryption processes.
Quantum Cryptography
Are cryptographic keys that are used only once after generation.
Ephemeral keys
In symmetric or block encryption, there is a need to deal with multiple blocks of identical data to prevent multiple blocks of ciphertext that would identify the blocks of identical input data. There are multiple methods of dealing with this. The basic premise is to use some source of entropy before encrypting subsequent blocks so that identical blocks of plaintext produce differing blocks of ciphertext. These modes can be broken into three groups: authenticated, unauthenticated, and counter.
Modes of operation
Is a form of encryption designed to provide both confidentiality and authenticity services.
Authenticated
is a cryptographic process where data is encrypted to ensure its confidentiality but lacks mechanisms for verifying the integrity or authenticity of the encrypted data.
Unauthenticated
Is a block cipher mode of operation used in symmetric encryption algorithms to provide confidentiality for data. It transforms a block cipher into a stream cipher, allowing encryption of plaintext data of arbitrary length. Is widely used in various cryptographic applications due to its simplicity, efficiency, and parallelizability.
Counter