This type of encryption uses the same key for both encryption and decryption.
What is symmetric encryption?
This basic component of cryptography refers to the random string of bits used to encrypt and decrypt data.
What is a cryptographic key?
This protocol secures web browsing by encrypting communications between web servers and browsers.
What is HTTPS (HTTP Secure) or TLS/SSL?
This basic form of cryptanalysis relies on analyzing the frequency of letters or symbols in encrypted text.
What is frequency analysis or "counting letters"?
This cryptographic technology underlies Bitcoin and other cryptocurrencies, providing a secure, decentralized transaction ledger.
What is blockchain?
This algorithm, created by Ron Rivest, Adi Shamir, and Leonard Adleman, is widely used for secure data transmission.
What is RSA?
This secure approach to key distribution involves embedding keys in hardware during manufacturing.
What is key pre-distribution?
This cryptographic process verifies that a message has not been altered by creating a unique identifier based on the message content.
What is a digital signature?
This attack occurs when two different inputs to a hash function produce the same output value.
What is a collision attack?
This method of storing passwords converts them into hash values with added random data to prevent rainbow table attacks.
What is password salting (or using salted hashes)?
This symmetric encryption algorithm became a U.S. federal government standard in 2001 and uses 128-bit, 192-bit, or 256-bit keys.
What is AES (Advanced Encryption Standard)?
This system manages the creation, distribution, and revocation of public key certificates and is commonly used in web security.
What is a Public Key Infrastructure (PKI)?
This protocol establishes a secure encrypted connection between a client and server, commonly used for remote access to systems.
What is SSH (Secure Shell)?
This type of attack attempts to bypass encryption by focusing on implementation flaws rather than the cryptographic algorithm itself.
What is a side-channel attack?
his system uses unique physical characteristics like fingerprints or retina patterns for authentication instead of encryption keys.
What is biometric authentication?
Unlike encryption algorithms, these one-way functions convert data into a fixed-size string of bytes, commonly used for password storage and data integrity verification.
What are hash functions (or cryptographic hash functions)?
This technique divides a cryptographic key into multiple parts where a minimum number of parts are needed to reconstruct the original key.
What is secret sharing, split handling, or Shamir's Secret Sharing?
This protocol allows two parties to establish a shared secret key over an insecure channel without any prior shared secret.
What is the Diffie-Hellman key exchange?
This attack attempts to recover encryption keys by analyzing the relationship between power consumption and encryption operations.
What is power analysis (or differential power analysis)?
This technique hides sensitive data within ordinary, non-secret data or a file, such as embedding a message within an image.
What is steganography?
This type of cryptographic system uses mathematical structures and provides the same security as RSA with smaller key sizes.
What is Elliptic Curve Cryptography (ECC)?
This method for secure key exchange uses a trusted third party to distribute symmetric keys between parties wishing to communicate securely.
What is a Key Distribution Center (KDC)?
This technique proves knowledge of a secret without revealing the secret itself, useful in zero-knowledge authentication systems.
What is a zero-knowledge proof?
This famous attack against RSA uses mathematical factorization to try to determine the prime factors of the public key.
What is integer factorization (or the factoring attack)?
This developing field of cryptography aims to create encryption methods that will remain secure even against quantum computers.
What is post-quantum cryptography (or quantum-resistant cryptography)?