Introduction to Cryptography
Modern Cryptography
Public-Key Infrastructure and Web Security
Introductions to Blockchains
100

Vernam’s One Time Pad encryption uses this bitwise operation on a pad and a ciphertext or message to both decrypt and encrypt

XOR

100

CTR is short for this cipher mode of operation

Counter mode

100

Signed by a trusted 3rd party authority and be used to verify data integrity, this document contains an identity and a public key

Digital certificate

100

The integrity of blockchain relies on the competitiveness of these individuals

Miners

200

What are the 3 algorithms of an encryption scheme?

Generate, Encrypt, Decrypt

200

Created in 1977 this cryptosystem uses a public key pair for encryption but a private key pair for decryption.

RSA

200

When a secret key is compromised but previous sessions (messages) remain uncompromised

Forward secrecy

200

What are the three main uses of blockchain?

stop tampering, bootstrap trust, establish consensus

300

This property of the one time pad ensures that an attacker is unable to confirm nor deny any hypothesis about the key used to encrypt messages.

Perfect secrecy

300

Unnamed contributor to the Diffie-Hellman key exchange

Merkle

300

Cryptographic scheme used to verify the authenticity of a digital message

Signature

300

 A small piece of code or logic that operates on a blockchain

Smart contract

400

Messages sent under one time pad encryption can be undetectably modified by the attacker, demonstrating this weakness of the one time pad.

Data integrity

400

Used in the Data Encryption Standard, this technique splits plain text into two halves, repeatedly encrypting one half and XORing the result with the other

Feistel network

400

Authenticated Diffie-Helman key exchange is protected against this type of attack by signing private keys

Man in the middle
400

This phenomenon occurs when a bitcoin blockchain is split, making it go in a different direction and creating different versions

Forking

500

In cryptography, this symmetric key algorithm combines plaintext with a stream of pseudorandom digits.

Stream cipher

500

Block cipher design uses combinations of these cipher techniques to create strong encryptions.

Substitution, transposition

500

Released in 1996, SSL was first developed for use in this web browser

Netscape

500

The four objectives of contract design are

Observability, Verifiability Privity, Enforceability

M
e
n
u