Digital signitures - Integrity, Authentication, Non-Repudiation, Key stretching - mechanism for extending the length of a cryptographic, PBKDF2, Bcrypt - examples of key stretching, Elliptic Curve Cryptography (ECC) - Asymmetric, Low processing, suitable for mobile devices, PFS - refers to a solution designed to strengthen the security of session keys, Quantum Computing - emerging field of advanced computing technologies based on the principles of physics, Post-quantum cryptography - According to predictions, the most future-proof cryptographic, ephermal key - asymmetric encryption key designed to be used only for a single session or transaction, session key - Used during a single session, Symmetric key, Symmetric - Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA, asymectric - RSA, DSA, Diffie-Hellman, ECC, ECDH, ECDSA, ElGamal, Lattice-based crypt, Post-Quantum, obscurity concept - code obsfucation, steganography, SSID broadcast suppression,
0%
Cryptography Concepts
Share
Share
Share
by
Orellanabilly03
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?