Please enable JavaScript.
Coggle requires JavaScript to display documents.
Practical Cryptography - Coggle Diagram
- 
- Practical Cryptography 
- 
- Cryptographic services 
- 
- 
- Non-repudiation 
- 
- Ensuring the original sender deny sending dataor engaging in a digital transaction such as a contract,a financial transaction, or some other agreement 
 
 
- 
 
- 
- 
- 
- 
- Hashing 
- 
- 
- 
- 
- 
- Common hash functions 
- 
- SHA-1, which produces a 160-bit digest. 
 
- 
- 
- RIPEMD,which has several different bit sizes, 
 
- 
- The rapidly emerging SHA-3, which has bit sizes from 224 to 512 
 
- 
- Whirlpool, which is a modification of the AES algorithm. 
 
 
- 
- Converts data of any input size to a fixed-length string called a hash-value, message digest, fingerprint 
 
- 
 
- 
- Salting 
- 
- 
- When an attacker can access a database of password hashes,they can use either hash tables or what are referred to as rainbow tables,to look up the matching hashes, which they can useto discover the passwords or other hashed data. 
 
 
- 
- 
- Key exchange 
- 
- 
- 
- 
- RSA key exchange 
- 
- The RSA algorithm can sign public-key certificates,