Please enable JavaScript.
Coggle requires JavaScript to display documents.
3-ENCRYPTION & related tech - Coggle Diagram
3-ENCRYPTION
& related tech
1-ENCRYPTION
vocabulary
plaintext/cyphertext
work factor
hash functions/digital signature
cryptographic system
encryption algorithms & keys
AES with 128 or 256 bits key
secret(symmetric) &
public (asymmetric) algorithms
cryptosystem
RSA (asymmetric)
crypto keys vs passwords
encryption in time
90s
TLS
today
TLS (transport layer security)
protects data in flight
pluggable cryptographic control
working with encrypted data
multiparty computation
secure enclaves
homomorphic e
.
encryption protecting data at rest: app-level or disk level
tomorrow
quantum key distribution
post quantum cryptography
2-SECRET KEY E.
symmetric
algorithms and key sizes
AES
(replaced DES)
stream ciphers and block ciphers
crypto attacks
brute force
crypto analysis
known cyphertext
known plaintext
differential cryptanalysis
related key attack
chosen plaintext
modes of operation
ecb (electronic codebook)
cbc (cipher block chaining)
ctr (counter mode)
ae (authenticated encryption)
making a key from a passphrase with a hash function
(Entropy)
typical uses
docs protection
block-level disk encryption
VPNs
TLS
encrypted databases
cryptographic erasure and retention rules
secret sharing
3-PUBLIC KEY E.
asymmetric
algorithms and key sizes
RSA
its keys can be used interchangeably
Digital Signature algorithm
elliptic curve
PKE easier to crack than SKE
key search attack not applicable to PKE
attacker can create any n. of chosen plaintext/ciphertexts pairs
digital signatures
integrity & non-repudiation
hybrid systems: TLS
S/MIME and PGP
4-PUBLIC KEY
INFRASTRUCTURE
certificates
PKI limitations & EV certificates
client side PKI
certificate revocation
time
DRM
ORAM & privacy information retrieval
preventing anyone to access
patterns of reads and write