Password salting adds additional characters to passwords before hashing them, and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks. In cryptography, a salt is random data that is used as an additional input to a one-way function that “hashes” a password or passphrase. Salts are closely related to the concept […]
What is Diffie Hellman?
Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple.
What is a Digital Certificate?
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document used to prove ownership of a public key.
What is PKI?
A Public Key Infrastructure (PKI) is a group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. A PKI allows two entities to privately share symmetric keys without any prior communication.
Using Cryptographic Protocols
When using digital signatures with email: The sender’s private key encrypts (or signs). The sender’s public key decrypts. A digital signature provides authentication (verified identification) of the sender, nonrepudiation, and integrity of the message. Senders create a digital signature by hashing a message and encrypting the hash with the sender’s private key. Recipients decrypt the […]
Cryptographic Algorithms and Protocols
Name Type Algorithm Method Key Size Strength Replaced By DES Symmetric 64-bit block cipher 64 bit (56 + 8 parity) 56-bit encryption keys Very weak 3DES 3DES Symmetric 64-bit block cipher 192 bit (168 bit + 24 parity) Moderate AES Blowfish Symmetric 64-bit block cipher 32- to 448-bit key AES Symmetric 128-bit block cipher 128-bit […]
What is the difference between the encryption standards AES and DES?
Can you give me an overview of how public-key cryptography works?
What is the difference between symmetric-key cryptography and public-key cryptography?
Symmetric key cryptography is also known as shared key cryptography. As the name suggests, it involves two people using the same private key to both encrypt and decrypt information. Public key cryptography, on the other hand, is where two different keys are used – a public key for encryption and a private key for decryption.