Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography - Coggle Diagram
Cryptography
uses:
authentication
integrity / non-repudiation
secure communication
transforming a readable msg into a form only readable by authorized users
decryption
unscrambling ciphertext to plaintext
encryption
scrambling plaintext to ciphertext
symmetric encryption
uses same key
asymmetric encryption
uses 2 different keys
quantum cryptography
used to secure communication
post-quantum cryptography
designed to be secure against the threats posed by quantum computers.
key management
managing and maintaining encryption keys
ISAKMP
set of procedures for authenticating)
XKMS
extensible markup language key management specification - protocols for distributing and registering public keys
IPSec
protects internet protocol packets from disclosure/change
Managed PKI
services to manage public key management
AES
advanced encryption standard
ANSI X9.17
financial industry standard for key management procedures
certificate management