History
Cryptographic Principles
Cryptographic Tools
Communication Protocols
Keywords
100

This ancient Egyptian writing system used hieroglyphs to disguise messages.


What is Hieratic?


100

This concept ensures that only the intended recipient can decrypt a message.

What is Confidentiality?

100

This block cipher uses a Feistel network and a 128-bit key for encryption.

What is AES (Advanced Encryption Standard)?

100

This protocol establishes a secure connection between a web server and a browser for encrypted communication.

What is HTTPS (Hypertext Transfer Protocol Secure)?

100

Encrypted message components that can be mathematically proven as authentic.

What is digital signatures?

200

 Invented by Julius Caesar, this simple substitution cipher shifts each letter a fixed number of positions.


What is the Caesar Cipher?

200

This principle guarantees that a message hasn't been tampered with during transmission.

What is Integrity?

200

This hashing algorithm produces a unique fixed-size message digest from an input of any length.

What is SHA-256 (Secure Hash Algorithm)?

200

This protocol allows secure remote access to a computer system using public-key cryptography.

What is SSH (Secure Shell)?

200

The process of reversing public-key encryption to verify that a message was sent by the sender and thus cannot be refuted.

What is nonrepudiation?

300

This 19th-century German cipher machine used rotors to encipher messages.


What is the Enigma Machine?

300

This property allows the recipient to verify the authenticity of the sender.

What is Authentication?

300

This digital signature scheme uses a private key to create a signature that can be verified with the corresponding public key.

What is DSA (Digital Signature Algorithm)?

300

uses port number 21 by default, facilitating secure data movement over a single internet connection.

What is SFTP?

300

 Mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.

What is hash functions?

400

The cryptocurrency Bitcoin employs this algorithm to secure its blockchain.


What is Elliptic Curve Cryptography ?

400

This type of cryptography uses a single secret key for both encryption and decryption.

What is Symmetric Cryptography?

400

This electronic document format uses digital signatures to ensure document integrity and authenticity.


What is a PDF (Portable Document Format)?

400

Used for E-mail Routing on port 25

What is Simple Mail Transfer Protocol (SMTP)?

400

 A key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.

What is message authentication code (MAC)?

500

This public-key cryptography system, invented by Rivest, Shamir, and Adleman, is widely used for secure communication.

 What is RSA?

500

 This type of cryptography uses a pair of keys, a public key for encryption and a private key for decryption.

 What is Asymmetric Cryptography?

500

This secure communication protocol uses a combination of encryption, digital signatures, and key exchange mechanisms.

What is TLS/SSL (Transport Layer Security/Secure Sockets Layer)?

500

This protocol is used for secure communication in virtual private networks (VPNs).


What is IKEv2 (Internet Key Exchange version 2)?

500

A function within Boolean algebra used as an encryption function in which two bits are compared. If the two bits are identical, the result is a binary 0; otherwise, the result is a binary 1.

What is exclusive OR operation (XOR) ?

M
e
n
u