Vernam’s One Time Pad encryption uses this bitwise operation on a pad and a ciphertext or message to both decrypt and encrypt
XOR
CTR is short for this cipher mode of operation
Counter mode
Signed by a trusted 3rd party authority and be used to verify data integrity, this document contains an identity and a public key
Digital certificate
The integrity of blockchain relies on the competitiveness of these individuals
Miners
What are the 3 algorithms of an encryption scheme?
Generate, Encrypt, Decrypt
Created in 1977 this cryptosystem uses a public key pair for encryption but a private key pair for decryption.
RSA
When a secret key is compromised but previous sessions (messages) remain uncompromised
Forward secrecy
What are the three main uses of blockchain?
stop tampering, bootstrap trust, establish consensus
This property of the one time pad ensures that an attacker is unable to confirm nor deny any hypothesis about the key used to encrypt messages.
Perfect secrecy
Unnamed contributor to the Diffie-Hellman key exchange
Merkle
Cryptographic scheme used to verify the authenticity of a digital message
Signature
A small piece of code or logic that operates on a blockchain
Smart contract
Messages sent under one time pad encryption can be undetectably modified by the attacker, demonstrating this weakness of the one time pad.
Data integrity
Used in the Data Encryption Standard, this technique splits plain text into two halves, repeatedly encrypting one half and XORing the result with the other
Feistel network
Authenticated Diffie-Helman key exchange is protected against this type of attack by signing private keys
This phenomenon occurs when a bitcoin blockchain is split, making it go in a different direction and creating different versions
Forking
In cryptography, this symmetric key algorithm combines plaintext with a stream of pseudorandom digits.
Stream cipher
Block cipher design uses combinations of these cipher techniques to create strong encryptions.
Substitution, transposition
Released in 1996, SSL was first developed for use in this web browser
Netscape
The four objectives of contract design are
Observability, Verifiability Privity, Enforceability