IV - Encryption Flashcards
Algorithm
mathematical applications applied to a block of data
Keys (algorithms)
A small piece of data that controls the algorithm’s execution. Also required for decryption.
Symmetric encryption
Same key for both encryption and decryption. Faster, but much less secure.
Asymmetric encryption
Uses a key-pair. Public-key cryptography.
Application encryption
Document-based encryption. Provides built-in protection that’s applied throughout a program.
Record encryption
Records are encrypted one record at a time. More granular but less efficient.
Homomorphic encryption
Manipulates information without first decrypting it. I think eyaml offers this capability.
Polymorphic encryption
The algorithm (encryption/decryption pair) is mutated with each copy of the code. Since it mutates, the encryption is harder to reverse engineer.
Mix network
Onion routing network. Hide traffic in the crowd by combining traffic from multiple computers into a single channel. Traffic separated again at the exit node.
Secure multi-computer computation
Two parties jointly compute a function while keeping their respective inputs private. One party can never see the other party’s data.
Private information retrieval (PIR)
Retrieving data from a DB without revealing to the DB (or another observer) what info is actually being retrieved.