Cryptographic Concepts Flashcards
Digital Signatures
Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity
Digital Signatures
Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity
Digital Signatures
Encrypted hash of sender private key
DSS
Digital Signature Standard
SHA 2or 3 message softest in conjunction with 3 encryption algorithms; DSA, RSA, ECDSA
Salting
Random data used for extra input to a hash. Reduced effectiveness for Rainbow Tables
ECC
Elliptic Curve Cryptography
Symmetric
Shared secret key,
Poor scalability, easy distribution and non repudiation
Asymmetric
Public-Private keys
Scalability, easy distribution
Asymmetric Key Use with data
Data:
To encrypt use recipients public key
Decrypt use your own private key
Signature:
Use your private key
Recipient uses public key
Symmetric algorithm Use
For bulk encryption eg AES256
Asymmetric Algorithm Use
Distribution of symmetric keys
Digital signatures, Non repudiation and key agreement
Eg. RSA, DSS, ECC
Hash Use
Digital signatures
Pseudo-Random number generation
Integrity services
Post Quantum Cryptography
New kinds of approaches using todays computers but will be resistant to quantum computers when they arrive
Quantum Key Distribution
Transferring with photons of light and can’t be copied or intercepted