In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).
History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.
Quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanicalproperties to perform cryptographic tasks.
Backdoor (computing)
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
Cryptography
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.
Discrete logarithm
In mathematics, a discrete logarithm is an integer k solving the equation bk = g, where b and g are elements of a finite group.
Elliptic curve cryptography
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
Encryption
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.
Information security
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.
RSA (cryptosystem)
RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission.
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading.
Data integrity
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.
Enigma machine
The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-twentieth century to protect commercial, diplomatic and military communication.
Kerckhoffs's principle
In cryptography, Kerckhoffs' principle (also called Kerckhoffs' desideratum, Kerckhoffs' assumption, axiom, or law) was stated by Dutch cryptographer Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
Password strength
Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks.
Transport Layer Security
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.
Colossus computer
Colossus was the name of a series of computers developed by British codebreakers in 1943-1945 to help in the cryptanalysis of the Lorenz cipher.
Hardware random number generator
In computing, a hardware random number generator (TRNG, True Random Number Generator) is a device that generates random numbers from a physical process, rather than a computer program.
Electronic signature
An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.
Passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.
Outline of cryptography
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information.
Sacher hexachord
The Sacher hexachord (6-Z11, musical cryptogram on the name of Swiss conductor Paul Sacher) is a hexachord notable for its use in twelve compositions (12 Hommages à Paul Sacher) created at the invitation of Mstislav Rostropovich for Sacher's seventieth birthday in 1976, including Pierre Boulez's Messagesquisse, Hans Werner Henze's Capriccio, Witold Lutosławski's Sacher Variation, and Henri Dutilleux's Trois strophes sur le nom de Sacher.
Voice inversion
Voice Inversion scrambling is an analog method of obscuring the content of a transmission.
Floradora
"Floradora", also called "Keyword," was a doubly enciphered diplomatic code used by the Germans during the Second World War.
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).
History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.
Quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanicalproperties to perform cryptographic tasks.
Backdoor (computing)
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
Cryptography
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.
Discrete logarithm
In mathematics, a discrete logarithm is an integer k solving the equation bk = g, where b and g are elements of a finite group.
Elliptic curve cryptography
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
Encryption
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.
Information security
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.
RSA (cryptosystem)
RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission.
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading.
Data integrity
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.
Enigma machine
The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-twentieth century to protect commercial, diplomatic and military communication.
Kerckhoffs's principle
In cryptography, Kerckhoffs' principle (also called Kerckhoffs' desideratum, Kerckhoffs' assumption, axiom, or law) was stated by Dutch cryptographer Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
Password strength
Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks.
Transport Layer Security
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.
Colossus computer
Colossus was the name of a series of computers developed by British codebreakers in 1943-1945 to help in the cryptanalysis of the Lorenz cipher.
Hardware random number generator
In computing, a hardware random number generator (TRNG, True Random Number Generator) is a device that generates random numbers from a physical process, rather than a computer program.
Electronic signature
An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.
Passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.
Outline of cryptography
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information.
Sacher hexachord
The Sacher hexachord (6-Z11, musical cryptogram on the name of Swiss conductor Paul Sacher) is a hexachord notable for its use in twelve compositions (12 Hommages à Paul Sacher) created at the invitation of Mstislav Rostropovich for Sacher's seventieth birthday in 1976, including Pierre Boulez's Messagesquisse, Hans Werner Henze's Capriccio, Witold Lutosławski's Sacher Variation, and Henri Dutilleux's Trois strophes sur le nom de Sacher.
Voice inversion
Voice Inversion scrambling is an analog method of obscuring the content of a transmission.
Floradora
"Floradora", also called "Keyword," was a doubly enciphered diplomatic code used by the Germans during the Second World War.
Studylib tips
Did you forget to review your flashcards?
Try the Chrome extension that turns your New Tab screen into a flashcards viewer!
The idea behind Studylib Extension is that reviewing flashcards will be easier if we distribute all flashcards reviewing into smaller sessions throughout the working day.