This ancient Egyptian writing system used hieroglyphs to disguise messages.
What is Hieratic?
This concept ensures that only the intended recipient can decrypt a message.
What is Confidentiality?
This block cipher uses a Feistel network and a 128-bit key for encryption.
What is AES (Advanced Encryption Standard)?
This protocol establishes a secure connection between a web server and a browser for encrypted communication.
What is HTTPS (Hypertext Transfer Protocol Secure)?
Encrypted message components that can be mathematically proven as authentic.
What is digital signatures?
Invented by Julius Caesar, this simple substitution cipher shifts each letter a fixed number of positions.
What is the Caesar Cipher?
This principle guarantees that a message hasn't been tampered with during transmission.
What is Integrity?
This hashing algorithm produces a unique fixed-size message digest from an input of any length.
What is SHA-256 (Secure Hash Algorithm)?
This protocol allows secure remote access to a computer system using public-key cryptography.
What is SSH (Secure Shell)?
The process of reversing public-key encryption to verify that a message was sent by the sender and thus cannot be refuted.
What is nonrepudiation?
This 19th-century German cipher machine used rotors to encipher messages.
What is the Enigma Machine?
This property allows the recipient to verify the authenticity of the sender.
What is Authentication?
This digital signature scheme uses a private key to create a signature that can be verified with the corresponding public key.
What is DSA (Digital Signature Algorithm)?
uses port number 21 by default, facilitating secure data movement over a single internet connection.
What is SFTP?
Mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.
What is hash functions?
The cryptocurrency Bitcoin employs this algorithm to secure its blockchain.
What is Elliptic Curve Cryptography ?
This type of cryptography uses a single secret key for both encryption and decryption.
What is Symmetric Cryptography?
This electronic document format uses digital signatures to ensure document integrity and authenticity.
What is a PDF (Portable Document Format)?
Used for E-mail Routing on port 25
What is Simple Mail Transfer Protocol (SMTP)?
A key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
What is message authentication code (MAC)?
This public-key cryptography system, invented by Rivest, Shamir, and Adleman, is widely used for secure communication.
What is RSA?
This type of cryptography uses a pair of keys, a public key for encryption and a private key for decryption.
What is Asymmetric Cryptography?
This secure communication protocol uses a combination of encryption, digital signatures, and key exchange mechanisms.
What is TLS/SSL (Transport Layer Security/Secure Sockets Layer)?
This protocol is used for secure communication in virtual private networks (VPNs).
What is IKEv2 (Internet Key Exchange version 2)?
A function within Boolean algebra used as an encryption function in which two bits are compared. If the two bits are identical, the result is a binary 0; otherwise, the result is a binary 1.
What is exclusive OR operation (XOR) ?