8. Cryptographic Solutions Flashcards
Symmetric
Uses Same key for encryption and decryption
Asymmetric
Uses a pair of keys for encryption and decryption
DES
Triple DES
IDEA
AES
Blowfish
Twofish
Rivest Cipher
Symmetric Algorithms
Diffie-Hellman
RSA
Elliptic Curve Cryptography
Asymmetric Algorithms
MD5
SHA Family
RIPEMD
HMAC
Hashing Algorithms
Public Key Infrastructure (PKI)
Framework managing digital keys and certificates for secure data transfer
Digital Certificates
Electronic credentials verifying entity identity for secure communications
Blockchain
Decentralized, immutable ledger ensuring data integrity and transparency
Encryption Tools
TPM
HSM
Key Management Systems
Secure Enclave
Obfuscation Methods
Steganography
Tokenization
Data Masking
3 Types of Cryptographic Attacks
Downgrade Attacks
Collision Attacks
Quantum Computing Threats
Key Escrow
Storage of cryptographic keys in a secure, third-party location
Root of Trust
Highest level of trust in certificate validation
Certificate Authority (CA)
Trusted third party that issues digital certificates
Registration Authority (RA)
Request identifying information from the user and forwards certificate request up to the CA to create a digital certificate.