These are algorithms used to protect data by encoding it into ciphertext. Examples include RSA and AES.
Cryptography: The field that deals with the creation and analysis of algorithms for securing information.
Symmetric Key Cryptography: Uses a single key for both encryption and decryption.
Asymmetric Key Cryptography: Uses two different keys for encryption and decryption.
Public Key Infrastructure (PKI): The set of hardware, software, policies, and procedures required for creating, managing, distributing, using, storing and revoking digital certificates.
Digital Certificates: A digital document that certifies the ownership of a public key by a specific entity.
Hash Functions: A mathematical function that takes input data of variable length and gives fixed-length output data that represents the input data.
Message Authentication Code (MAC): A short piece of information that is used to authenticate a message.
Data Encryption Standard (DES): A symmetric encryption algorithm developed by the US government in the 1970s.
Advanced Encryption Standard (AES): A symmetric encryption algorithm that is widely used today.
Differential Cryptanalysis: A method of attacking cryptography systems by measuring the difference between two plaintexts.
Block Ciphers: An encryption algorithm that divides the plaintext into fixed-length blocks and processes each block independently.
Stream Ciphers: An encryption algorithm that processes the plaintext one bit or one byte at a time.
Key Exchange: The process of exchanging new keys among communicating parties.
Cryptanalysis: The study of cryptographic systems with the goal of finding weaknesses in them.
Quantum Cryptography: A cryptographic system that uses the principles of quantum mechanics to secure information.
Symmetric Encryption Algorithms: These algorithms use the same key for both encrypting and decrypting messages.
Asymmetric Encryption Algorithms: In this type of encryption, there are two keys, a public key and a private key. The public key is used to encrypt messages, while the private key is used to decrypt them.
Hash Functions: These algorithms take input data and produce a fixed-length hash code that represents the data. Hash functions are commonly used for digital signatures and to ensure data integrity.
Advanced Encryption Standard (AES): This is a widely-used symmetric encryption algorithm that is considered to be highly secure.
Data Encryption Standard (DES): This symmetric encryption algorithm was once widely used, but is now considered to be vulnerable to attack.
RSA: This is a widely-used asymmetric encryption algorithm that uses large prime numbers to encrypt and decrypt data.
Digital Signature Algorithm (DSA): This asymmetric encryption algorithm is used for digital signatures and is often used in conjunction with SHA hashes.
Blowfish: This symmetric encryption algorithm is highly secure and widely used for a variety of applications.
Twofish: This symmetric encryption algorithm is a successor to Blowfish and is also highly secure.
RC4: This is a stream cipher algorithm that is widely used in wireless networks, but is considered to be vulnerable to attack.
ChaCha: This is a symmetric encryption algorithm that is known for being fast and secure, and is often used in VPNs and other applications.
Elliptic Curve Cryptography: This is a form of asymmetric encryption that is highly secure and efficient, making it a popular choice for mobile devices.
Camellia: This symmetric encryption algorithm is highly secure and has been standardized in Japan.
IDEA: This symmetric encryption algorithm is highly secure and widely used in Europe.
Serpent: This symmetric encryption algorithm is highly secure and was a finalist in the AES selection process.
Triple DES: This symmetric encryption algorithm uses three keys for added security and is widely used in financial transactions.
Skipjack: This symmetric encryption algorithm was developed by the U.S. government for use in secure telephony.