Cryptography

Terms and concepts you should know

Paul Krzyzanowski

February 10, 2024

  • Shared symmetric keys
  • Trapdoor function
  • Public-key algorithm
  • Asymmetric cryptography
  • Public key
  • Private key
  • Factoring
  • Discrete logarithms
  • RSA (what it does & what it’s based on)
  • ECC (what it does & what it’s based on)
  • Why longer keys in RSA?
  • Communication with public-key algorithms
  • Diffie-Hellman Key Exchange
  • Hybrid cryptosystem
  • Forward secrecy
  • Session key
  • Ephemeral key
  • Quantum computing threat
  • One-way function
  • Cryptographic hash function
  • Pre-image resistance
  • Collision resistance
  • Weak vs. strong collision resistance
  • Diffusion
  • Message digest
  • Recognize SHA-1, SHA-2 (-256, -512), SHA-3
  • Pigeonhole principle
  • Impact of Birthday paradox
  • Message authentication code (MAC)
  • HMAC
  • CBC-MAC
  • Digital signature
  • Signing
  • Verification
  • Anonymous identities
  • Digital certificates (X.509)
  • Certification Authority (CA)
  • Per-page hashes in signed software
Last modified February 10, 2024.
recycled pixels