Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography - Coggle Diagram
Cryptography
private or symmetric key -
use the same way to encrypt and decrypt
public or asymmetric key
- uses different keys to encrypt and decrypt
Unencrypted - information in understandable form; plaintext or cleartext
Encrypted - information in scrambled form; ciphertext
Role of it in Cybersecurity
Protect Data at transit
Protect Data at rest
Art of concealing information from others.
Confidentially - keeps information secret from unauthorized users
Integrity - cannot change information after sending it; checksums and hashes
Authentication - confirms the identity of an entity
Non-repudiation - prevents a party from denying a previous statement or action.
Internal Security
Confidentiality - info is readable only for authorized people
Privacy - protects the release the information that could identify an individual
Intergrity- ensures no one changes or deletes data
Authorization - approving someone to a access a certain task or data
Access Control - restricting information to the right people
Security in Business relation
Message authentication - confirms the identity of a person
Signature - binds a message or a data to a specific entity
receipt and confirmation - verifies that an entity acknowledges the info has arrived
Non-repudiation
Security Measures that benefit everyone
Anonymity- user's identity is disguised
Timestamping - provides an exact time when a producer creates or sends info
Revocation - stops authorization for access to data
High resiliency - the ability of a cipher to resist an attack
Supporting obfuscation - types of ciphers that make it easy to hide the content of file without any complex key management issues
types of ciphers
Transposition Ciphers - rearranges characters or bits of data
Substitution - replaces bits, character or blocks of info with other bits, characters or blocks