You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Encryption** | The process of encoding information making in away that makes it unreadable for unauthorized users. `Plaintext` -> `Ciphertext`
21
19
**Decryption** | The reverse process of `encryption`. It is the process of decoding the data which has been encrypted making it readable for authorized users. `Ciphertext` -> `Plaintext`
22
20
**Cryptographic key/Key** | Is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
23
-
**RSA** | Rivest-Shamir-Adleman (Surnames of the creators)
21
+
**RSA** | **Rivest-Shamir-Adleman** (Surnames of the creators)
24
22
**Symmetric Cryptography/Symmetric-Key Cryptography** | Makes use of the same cryptographic keys for both `encryption` of `plaintext` and `decryption` of `ciphertext`.
25
-
**Asymmetric Cryptography/Public-Key Cryptography** | Makes use of different cryptographic keys(pair of public and private keys) used for encryption of plaintext and decryption of ciphertext.
23
+
**Asymmetric Cryptography/Public-Key Cryptography** | Makes use of different cryptographic keys(pair of `public` and `private keys`) used for `encryption` of `plaintext` and `decryption` of `ciphertext`.
26
24
**Public Key** | A key that is available to the public.
27
25
**Private Key** | A key that is private and known only to the owner.
28
-
**Cipher/Cypher** | An algorithm for performing encryption or decryption.
29
-
**Plaintext/Cleartext** | An unencrypted information pending input into a cryptographic algorithm.
30
-
**Ciphertext** | The result of encryption performed on plaintext using an algorithm - Cipher.
26
+
**Cipher/Cypher** | An algorithm for performing `encryption` or `decryption`.
27
+
**Plaintext/Cleartext** | An `unencrypted` information pending input into a cryptographic algorithm.
28
+
**Ciphertext** | The result of `encryption` performed on `plaintext` using an algorithm - `Cipher`.
31
29
**Block Size** | The length of the fixed length string of bits operated on by a `Block Cipher`. Both the input (`plaintext`) and output (`ciphertext`) are of the same length.
32
30
**Key Size/Key Length** | The number of bits in a key used by a cryptographic algorithm.
33
-
**Rounds** | In Block Ciphers, the number of times a cipher transformation is repeated over a block of plaintext to create a block of `ciphertext`. The number of rounds is determined by the key size/ key length.
31
+
**Rounds** | In Block Ciphers, the number of times a `cipher transformation` is repeated over a block of `plaintext` to create a block of `ciphertext`. The number of `rounds` is determined by the `key size/ key length`.
34
32
**Block Cipher** | A Symmetric-Key `Cipher` which operates on a groups of bits of fixed length, called `blocks`.
35
-
**[Block Cipher Mode of Operation](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation)** | Is an algorithm that uses a **block cipher** to provide information security such as confidentiality or authenticity. It describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block.
**Broken** | When brute-force attack is feasible i.e A key with a given key size can be permutated in feasible time to generate a key that correctly decrypts a `Ciphertext`.
38
-
**Brute-force attack** | When an attacker guesses many keys with the hope of eventually guessing correctly usually using a Supercomputer.
33
+
**[Block Cipher Mode of Operation](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation)** | Is an algorithm that uses a `block cipher` to provide information security such as `confidentiality` or `authenticity`. It describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block.
**Broken** | When `brute-force attack` is feasible i.e A key with a given key size can be permutated in feasible time to generate a key that correctly decrypts a `Ciphertext`.
36
+
**Brute-force attack** | When an attacker guesses many keys with the hope of eventually guessing correctly usually using a `supercomputer`.
**Cryptographic Hash function** | A mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a digest/hash) and is designed to be a one-way function - a function which is infeasible to invert.
**Cryptographic Hash function** | A mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a `digest/hash`) and is designed to be a one-way function - a function which is infeasible to invert.
65
63
**Digest/Hash** | The output of a Cryptographic Hash function.
66
-
**Digest size** | The size of the output of a Cryptographic Hash function.
67
-
**Block size** | The length of the fixed length string of bits operated on by a Cryptographic Hash function.
68
-
**Rounds** | In Cryptographic Hash functions, the number of times a digest transformation stage is repeated over a block of plaintext to create a digest.
69
-
**Salt** | Random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.
70
-
**Data Integrity** | is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle.
71
-
**Authentication** | Guarantees that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.
72
-
**Broken** | When a collision is found. i.e two different inputs generate the same hash usually using a Supercomputer.
64
+
**Digest Size** | The size of the output of a `Cryptographic Hash function`.
65
+
**Block Size** | The length of the fixed length string of bits operated on by a `Cryptographic Hash function`.
66
+
**Rounds** | In `Cryptographic Hash functions`, the number of times a `digest` transformation stage is repeated over a block of plaintext to create a `digest`.
67
+
**Salt** | Random data that is used as an additional input to a one-way function(`Cryptographic Hash functions`) that "hashes" data, a password or passphrase.
68
+
**Data Integrity** | Is the maintenance of, and the assurance of the `accuracy` and `consistency` of, data over its entire life-cycle.
69
+
**Authentication** | Guarantees that a message has not been modified while in transit (`data integrity`) and that the receiving party can `verify` the source of the message.
70
+
**Broken** | When a `collision` is found. i.e two different inputs generate the same hash usually using a `supercomputer`.
**[Binary-to-text Encoding](https://en.wikipedia.org/wiki/Binary-to-text_encoding)** | Encoding of data in plaintext. More precisely, it is an encoding of binary data in a sequence of printable characters.
114
-
**Base64** | A group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. Each Base64 digit represents exactly 6 bits of data. Three 8-bit bytes (i.e., a total of 24 bits) can therefore be represented by four 6-bit Base64 digits.
115
-
**URL encoding/Percent-encoding** | A mechanism for encoding information in a Uniform Resource Identifier (URI) under certain circumstances.
111
+
**[Binary-to-text Encoding](https://en.wikipedia.org/wiki/Binary-to-text_encoding)** | Encoding of data in `plaintext`. More precisely, it is an encoding of binary data(bytes/bits) in a sequence of printable characters.
112
+
**Base64** | A group of similar `binary-to-text encoding` schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. Each `Base64` digit represents exactly 6 bits of data. Three 8-bit bytes (i.e., a total of 24 bits) can therefore be represented by four 6-bit `Base64` digits.
113
+
**URL encoding/Percent-encoding** | A mechanism for encoding information in a `Uniform Resource Identifier` (**URI**) under certain circumstances.
0 commit comments