Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Cryptographic primitive

Index Cryptographic primitive

Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. [1]

30 relations: Advanced Encryption Standard, Authentication, Burrows–Abadi–Needham logic, Cipher, Commitment scheme, Computer programming, Computer security, Confidentiality, Cryptographic hash function, Cryptographic protocol, Cryptographically secure pseudorandom number generator, Cryptography, Cryptosystem, Data Encryption Standard, Digital signature, Information security, Mix network, One-way compression function, OpenSSL, Private information retrieval, Programming language, Public-key cryptography, RSA (cryptosystem), Secure Shell, SHA-1, SHA-2, Symmetric-key algorithm, Systems design, Transport Layer Security, Vulnerability.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Cryptographic primitive and Advanced Encryption Standard · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Cryptographic primitive and Authentication · See more »

Burrows–Abadi–Needham logic

Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols.

New!!: Cryptographic primitive and Burrows–Abadi–Needham logic · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Cryptographic primitive and Cipher · See more »

Commitment scheme

A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later.

New!!: Cryptographic primitive and Commitment scheme · See more »

Computer programming

Computer programming is the process of building and designing an executable computer program for accomplishing a specific computing task.

New!!: Cryptographic primitive and Computer programming · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Cryptographic primitive and Computer security · See more »

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: Cryptographic primitive and Confidentiality · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Cryptographic primitive and Cryptographic hash function · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

New!!: Cryptographic primitive and Cryptographic protocol · See more »

Cryptographically secure pseudorandom number generator

A cryptographically secure pseudo-random number generator (CSPRNG) or cryptographic pseudo-random number generator (CPRNG) is a pseudo-random number generator (PRNG) with properties that make it suitable for use in cryptography.

New!!: Cryptographic primitive and Cryptographically secure pseudorandom number generator · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Cryptographic primitive and Cryptography · See more »

Cryptosystem

In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).

New!!: Cryptographic primitive and Cryptosystem · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Cryptographic primitive and Data Encryption Standard · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Cryptographic primitive and Digital signature · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Cryptographic primitive and Information security · See more »

Mix network

Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination (possibly another mix node).

New!!: Cryptographic primitive and Mix network · See more »

One-way compression function

In cryptography, a one-way compression function is a function that transforms two fixed-length inputs into a fixed-length output.

New!!: Cryptographic primitive and One-way compression function · See more »

OpenSSL

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.

New!!: Cryptographic primitive and OpenSSL · See more »

Private information retrieval

In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved.

New!!: Cryptographic primitive and Private information retrieval · See more »

Programming language

A programming language is a formal language that specifies a set of instructions that can be used to produce various kinds of output.

New!!: Cryptographic primitive and Programming language · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Cryptographic primitive and Public-key cryptography · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Cryptographic primitive and RSA (cryptosystem) · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Cryptographic primitive and Secure Shell · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Cryptographic primitive and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Cryptographic primitive and SHA-2 · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Cryptographic primitive and Symmetric-key algorithm · See more »

Systems design

Systems design is the process of defining the architecture, modules, interfaces, and data for a system to satisfy specified requirements.

New!!: Cryptographic primitive and Systems design · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Cryptographic primitive and Transport Layer Security · See more »

Vulnerability

Vulnerability refers to the inability (of a system or a unit) to withstand the effects of a hostile environment.

New!!: Cryptographic primitive and Vulnerability · See more »

References

[1] https://en.wikipedia.org/wiki/Cryptographic_primitive

OutgoingIncoming
Hey! We are on Facebook now! »