Cryptography Concepts Flashcards
Integrity protection operations
When Materials, Plaintext, needs to be protected from unauthorized interception or alteration, it is encrypted into ciphertext.
Key exchange
Key exchange (also known as “key establishment”) is any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
Steganography
Greek steganos, or “covered,” and graphie, or “writing”) is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
A digital signature
is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
A digital certificate
is an electronic “passport” that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI).
A public key infrastructure (PKI)
supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the internet and verify the identity of the other party.
A public key certificate
is a digitally signed document that serves to validate the sender’s authorization and name.
Crypto Analysis
is the process of analyzing available information in an attempt to return the encrypted message to its original form.
Cryptographic process involve
algorithms and increasingly complex keys.
There are two types of cryptanalysis:
- Differential Cryptanalysis
- Linear Cryptanalysis
Differential Cryptanalysis
is done by comparing the input plaintext to the output ciphertext to try to determine the key used to encrypt the information.
Linear Cryptanalysis
is similar in that it uses both plaintext and ciphertext, but it puts the plaintext through a simplified cipher to try to deduce what key is likely to be In the full version of the cipher.
There are two Major types of key Algorithm (Cryptographic Techniques):
- Symmetric Key Algorithm
- Asymmetric Key Algorithm
Symmetric-key algorithms
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
The keys may be identical or there may be a simple transformation to go between the two keys.
Asymmetric Cryptography,
Asymmetric cryptograhy, also known as public key cryptography, uses public and private keys to encrypt and decrypt data.
Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. …
The public key is used to encrypt and the private key is used to decrypt.