Zusammenfassung der Ressource
Cryptography
- Asymmetric
Anmerkungen:
- A pair of keys are used -> They are also known as Public key cryptography because there are a public key and a private key, 2 for each party.
Anlagen:
- Diffie-Hellman
- ECDH
- RSA
- DSA
- ECDSA
- Symmetric
Anmerkungen:
- These algorithms use 1 symmetric key both for encryption and decryption.
Are particularly suitable for large amount of data.
- Block Algorithms
Anmerkungen:
- They split data in blocks of equal size, then process 1 block at time.
- DES
- 3DES (EEE or EDE)
- IDEA
- RC2
- RC5
- AES
- Operation modes
Anmerkungen:
- These are applied in case the data dimension is different from the basic block dimension
- data > basic block
- ECB
- CBC
- IGE
- CTS
Anmerkungen:
- This not uses padding and does not send more that than necessary
- Padding
- data < basic block
- CFB
- OFB
- CTR
- Stream Algorithms
Anmerkungen:
- Able to work on stream of data, 1 bit or byte at time.
- RC4
- SEAL
- Key stream
- pseudo-random key
- one-time pad