Professional Documents
Culture Documents
1. Cryptography
The practice and study of hiding information
2. Encryption
The process of changing information using an algorithm (or cipher) into
another form that is unreadable by others
3. Cipher
An algorithm that can perform encryption or decryption
4. Key
The essential piece of information that determines the output of a
cipher
5. Private Key
Only known to a specific user or users who keep the key a secret
6. Public key
Known to all parties involved in encrypted transactions within a given
group
7. Symmetric key algorithms
A class of cipher that uses identical or closely related keys for
encryption and decryption
Requires the secure initial exchange of one or more secret keys
Examples include DES, 3DES, RC, and AES
There are two types of symmetric keys:
A stream cipher is a type of algorithm that encrypts each byte in
a message one at a time.
A block cipher is a type of algorithm that encrypts a group of bits
collectively as individual units known as blocks.
8. Asymmetric key algorithms
Use a pair of different keys to encrypt and decrypt data.
The keys are related mathematically.
Examples include RSA, Diffie-Hellman, and ECC.
9. Public Key Cryptography
Uses asymmetric keys alone or in addition to symmetric keys.
Doesnt require the secure exchange of secret keys.
The public key is well known, and anyone can use it to encrypt
messages.