2.8 Summarize the basics of cryptographic concepts Flashcards
Digital signatures
Key length
Key stretching
Salting
Hashing
Key exchange
Elliptic-curve cryptography
Perfect forward secrecy
Quantum
-Communications
Quantum
-Computing
Post-quantum
Ephemeral
Modes of operation
-Authentication
Modes of operation
-Unauthentication
Modes of operation
-Counter
Blockchain
-Public ledgers
Cipher suites
-Stream
Cipher suites
-Block
Symmetric vs asymmetric
Lightweight cryptography
Steganography
-Audio
Steganography
-Video
Steganography
-Image
Homomorphic encryption
Common use cases
-Low power devices
Common use cases
-Low latency
Common use cases
-High resiliency
Common use cases
-Supporting confidentiality
Common use cases
-Supporting integrity
Common use cases
-Supporting obfuscation
Common use cases
-Supporting authentication
Common use cases
-Supporting non-repudiation
Limitations
-Speed
Limitations
-Size
Limitations
-Weak keys
Limitations
-Time
Limitations
-Longevity
Limitations
-Predictability
Limitations
-Reuse
Limitations
-Entropy
Limitations
-Computational overheads
Limitations
-Resource vs security constraints