null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
11309959
Cryptography
Description
Mind Map on Cryptography, created by Davide Cometa on 09/11/2017.
Mind Map by
Davide Cometa
, updated more than 1 year ago
More
Less
Created by
Davide Cometa
about 7 years ago
390
0
0
Resource summary
Cryptography
Asymmetric
Annotations:
A pair of keys are used -> They are also known as Public key cryptography because there are a public key and a private key, 2 for each party.
Attachments:
Certificates
Diffie-Hellman
ECDH
RSA
DSA
ECDSA
Symmetric
Annotations:
These algorithms use 1 symmetric key both for encryption and decryption. Are particularly suitable for large amount of data.
Block Algorithms
Annotations:
They split data in blocks of equal size, then process 1 block at time.
DES
3DES (EEE or EDE)
IDEA
RC2
RC5
AES
Operation modes
Annotations:
These are applied in case the data dimension is different from the basic block dimension
data > basic block
ECB
CBC
IGE
CTS
Annotations:
This not uses padding and does not send more that than necessary
Padding
data < basic block
CFB
OFB
CTR
Stream Algorithms
Annotations:
Able to work on stream of data, 1 bit or byte at time.
RC4
SEAL
Key stream
pseudo-random key
one-time pad
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Cryptography
Cher Bachar
PUBLIC KEY ENCRYPTION
Bhagya Prasad
SYMMETRIC ENCRYPTION
Bhagya Prasad
Security+ Cryptography
Lyndsay Badding
Cipher
Aina Syazwani
Introduction to Cryptography, Lecture 1
Jörg Schwartz
Ciphers
Abraham Nwokolo
Ciphers
Abraham Nwokolo
PUBLIC KEY ENCRYPTION
Bhagya Prasad
Spanish Vocab Flash Cards
Clarice Thorn
Girls' and Boys'Education - Catherine and Kaitlyn
catherine.dannib
Browse Library