Cryptography

Descripción

Mapa Mental sobre Cryptography, creado por Davide Cometa el 09/11/2017.
Davide Cometa
Mapa Mental por Davide Cometa, actualizado hace más de 1 año
Davide Cometa
Creado por Davide Cometa hace alrededor de 7 años
391
0

Resumen del Recurso

Cryptography
  1. Asymmetric

    Nota:

    • A pair of keys are used -> They are also known as Public key cryptography because there are a public key and a private key, 2 for each party.

    Adjunto:

    1. Diffie-Hellman
      1. ECDH
      2. RSA
        1. DSA
          1. ECDSA
        2. Symmetric

          Nota:

          • These algorithms use 1 symmetric key both for encryption and decryption.  Are particularly suitable for large amount of data.
          1. Block Algorithms

            Nota:

            • They split data in blocks of equal size, then process 1 block at time.
            1. DES
              1. 3DES (EEE or EDE)
              2. IDEA
                1. RC2
                  1. RC5
                    1. AES
                      1. Operation modes

                        Nota:

                        • These are applied in case the data dimension is different from the basic block dimension
                        1. data > basic block
                          1. ECB
                            1. CBC
                              1. IGE
                                1. CTS

                                  Nota:

                                  • This not uses padding and does not send more that than necessary
                                  1. Padding
                                  2. data < basic block
                                    1. CFB
                                      1. OFB
                                        1. CTR
                                    2. Stream Algorithms

                                      Nota:

                                      • Able to work on stream of data, 1 bit or byte at time.
                                      1. RC4
                                        1. SEAL
                                          1. Key stream
                                            1. pseudo-random key
                                              1. one-time pad
                                          Mostrar resumen completo Ocultar resumen completo

                                          Similar

                                          Cryptography
                                          Cher Bachar
                                          PUBLIC KEY ENCRYPTION
                                          Bhagya Prasad
                                          SYMMETRIC ENCRYPTION
                                          Bhagya Prasad
                                          Security+ Cryptography
                                          Lyndsay Badding
                                          Cipher
                                          Aina Syazwani
                                          Introduction to Cryptography, Lecture 1
                                          Jörg Schwartz
                                          Ciphers
                                          Abraham Nwokolo
                                          Ciphers
                                          Abraham Nwokolo
                                          PUBLIC KEY ENCRYPTION
                                          Bhagya Prasad
                                          LA EDAD MEDIA - EDUpunto.com
                                          EDUpunto Por: Ernesto De Frías
                                          Nietzsche: Estudio sobre la Ética
                                          maya velasquez