Cryptography Flashcards
cryptography
- kryptos meaning hidden
- prefix “crypt” means hidden and suffix “graphy”
cryptography
protecting data by hiding it from anyone who isnt suppoed to see, access, or change it
broad umbrell aterm that encompasses both cryptography and cryptanalysis
cryptology
cyrptananlysis
figuring out how to access data without having necessary cryptographic key
applications of cryptography
secure communication, financial transactio, and protecting sensitive data
- understanding of different types of cryptography such as symmetric, asymmetric
- basic concepts of encryption, decryption, hashing, and digital signatures
fundamentals of cryptography
types of cryptography
- symmetric
- asymmetric
symmetric
- uses single key for bothe encryption and decryption
- muts be shared by all communicationg parties
asymmetric
- allows users to encrypt information using shared keys
- two keys’ encyrption and decryption
cryptosystem
structure consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely
process by which a readable message is converted to unreadable form to prevent unauthorized parties from reading it
encryption
process of converting an encrypted message back to its original form
decryption
called as original message
plaintext
3 concepts of cryptosystem
- encyrption
- decryption
- plainytext
private key
- is a symmetric key
- use a single key for both encryption and decryption
- must be shared to all parties which can be a challenge in some situatiions
public key
asymmteric key that allows users to encrypt information using shred keys
when should symmteric encryption be used
due to better perfomance and faster speed, it is typically used fro bulk encyrption of large amounts of data for database encryption
how does symmetric encryption work
- message you want to encrypt plaintext)
- symmetric key algorithms
- shared key for you and your recipient that can encrypt and decrypt
- encrypted message no one can read
method used by Caesar to secretly communicate with his generals
Caesar cipher
is numbe of sequencer of steps that is used to convert plaintext information into ciphertext
cipher
how does asymmetric encryption work
- allows users to encrypt information using shared keys
- if you want to send a message over the internet but also dont want anyone but the intentedd recipient to see what youve written
is numbe of sequencer of steps that is used to convert plaintext information into ciphertext
how does asymmetric cryptography works
- algorithm starts process
- mathematical function generates key pair
asymmetric cryptography process
- registration
- lookup
- encrypt
- decode
- reply