Cryptography
Terms and concepts you should know
Paul Krzyzanowski
February 10, 2024
- Shared symmetric keys
- Trapdoor function
- Public-key algorithm
- Asymmetric cryptography
- Public key
- Private key
- Factoring
- Discrete logarithms
- RSA (what it does & what it’s based on)
- ECC (what it does & what it’s based on)
- Why longer keys in RSA?
- Communication with public-key algorithms
- Diffie-Hellman Key Exchange
- Hybrid cryptosystem
- Forward secrecy
- Session key
- Ephemeral key
- Quantum computing threat
- One-way function
- Cryptographic hash function
- Pre-image resistance
- Collision resistance
- Weak vs. strong collision resistance
- Diffusion
- Message digest
- Recognize SHA-1, SHA-2 (-256, -512), SHA-3
- Pigeonhole principle
- Impact of Birthday paradox
- Message authentication code (MAC)
- HMAC
- CBC-MAC
- Digital signature
- Signing
- Verification
- Anonymous identities
- Digital certificates (X.509)
- Certification Authority (CA)
- Per-page hashes in signed software