2.8 Summarize the basics of cryptographic concepts. Flashcards
Cipher Text
encrypted message
Cipher
Algorithm used to encrypt and/ or decrypt
Cryptanalysis
Finding vulnerabilities in ciphers
Crypto graphic Key
A KEY added to the end the cipher to encrypt it.
Key Stretching
encrypting a key multiple times to strength the key.
Bcrypt
Key stretching library
PBKDF2
Key stretching library
Lightweight cryptography
Used for IoT cryptography that has limited resources to encrypt
Homomorphic encryption (HE)
Preform calculations on a algorithm with decrypting the data.
Saves the encrypted result.
Symmetric Encryption
(Shared Secret)
Only using one key to decrypt and encrypt data.
If the key becomes known to unauthorized parties then you have to redo your encryption.
Asymmetric Encryption
Two or more different keys Public and Private.
Private Key and Public Key
Key you only have and a key everyone can see
Both mathematically related
EEC
Elliptic curve cryptography
IoT use curves for Asymmetric encryption because they don’t have the computing power for it
Digital Signatures
Cryptography/encryption combined with Hashing
Authentication non-repudiation, and integrity
Collison
When two hashes have the same out put