Terminology

Plaintext: The original, readable data or message.

Ciphertext: The encrypted version of the plaintext, rendered unreadable without the proper key.

Encryption: The process of converting plaintext into ciphertext using an algorithm and a key.

Decryption: The reverse process, transforming ciphertext back into plaintext using the corresponding key.

Keys: A key is a piece of information that determines the output of a cryptographic algorithm. Keys are crucial in both encryption and decryption processes.

Algorithms: Cryptographic algorithms are mathematical procedures used for encryption and decryption. They are designed to be computationally difficult to reverse without the key.

Hash Function: Converts input data into a fixed-size string of characters, typically a digest unique to each unique input, used for data integrity verification.

Digital Signature: A method to verify the authenticity and integrity of a message, software, or digital document using asymmetric cryptography.

Confidentiality: Ensures that information is accessible only to those authorized to access it, typically achieved through encryption.

Integrity: Ensures that information has not been altered in an unauthorized manner, often achieved through hashing and digital signatures.

Authentication: Confirms the identity of the parties involved in communication, achieved through digital certificates and public key infrastructure (PKI).

Non-repudiation: Ensures that a party cannot deny the authenticity of their signature on a document or a message they sent, achieved through digital signatures.

Public Key: Used in asymmetric encryption, it is shared openly to enable others to encrypt data or verify a digital signature.

Private Key: Used in asymmetric encryption, it is kept secret and used to decrypt data or create a digital signature.

Certificate Authority (CA): An entity that issues digital certificates, which verify the ownership of a public key.

Digital Certificate: An electronic document that uses a digital signature to bind a public key with an identity, such as a person or organization.

Secure Sockets Layer (SSL): A protocol for establishing authenticated and encrypted links between networked computers.

Transport Layer Security (TLS): A successor to SSL, providing secure communication over a computer network.

Advanced Encryption Standard (AES): A widely used symmetric encryption algorithm known for its strength and efficiency.

Data Encryption Standard (DES): An older symmetric encryption algorithm, now considered insecure due to its small key size.

Triple DES (3DES): An enhancement of DES that applies the encryption process three times with different keys for improved security.

Rivest-Shamir-Adleman (RSA): A popular asymmetric encryption algorithm used for secure data transmission.

Elliptic Curve Cryptography (ECC): An asymmetric encryption algorithm known for its efficiency and security, using smaller key sizes compared to RSA.

Pretty Good Privacy (PGP): An encryption program providing cryptographic privacy and authentication, commonly used for securing email communication.

Hash-based Message Authentication Code (HMAC): A specific type of message authentication code (MAC) involving a cryptographic hash function and a secret key.

Key Management: The process of generating, distributing, storing, and revoking encryption keys, crucial for the security of encryption systems.

Quantum Cryptography: A type of cryptography based on the principles of quantum mechanics, promising enhanced security.

Post-Quantum Cryptography: Developing cryptographic algorithms resistant to quantum computing attacks.

Homomorphic Encryption: Allows computations to be performed on encrypted data without decrypting it, ensuring data privacy and security.

Blockchain: A decentralized digital ledger that uses cryptographic techniques to secure and verify transactions.

Tokenization: The process of replacing sensitive data with unique identification symbols that retain essential information without compromising security.

Salts: A salt is a random value added to the input of a hash function to ensure that identical inputs produce different hash outputs.

Nonce: A nonce (number used once) is a random or pseudo-random value that is used only once in a cryptographic communication.

Last updated

Was this helpful?