Cryptography

Description

Mind Map on Cryptography, created by Davide Cometa on 09/11/2017.
Davide Cometa
Mind Map by Davide Cometa, updated more than 1 year ago
Davide Cometa
Created by Davide Cometa over 6 years ago
370
0

Resource summary

Cryptography
  1. Asymmetric

    Annotations:

    • A pair of keys are used -> They are also known as Public key cryptography because there are a public key and a private key, 2 for each party.

    Attachments:

    1. Diffie-Hellman
      1. ECDH
      2. RSA
        1. DSA
          1. ECDSA
        2. Symmetric

          Annotations:

          • These algorithms use 1 symmetric key both for encryption and decryption.  Are particularly suitable for large amount of data.
          1. Block Algorithms

            Annotations:

            • They split data in blocks of equal size, then process 1 block at time.
            1. DES
              1. 3DES (EEE or EDE)
              2. IDEA
                1. RC2
                  1. RC5
                    1. AES
                      1. Operation modes

                        Annotations:

                        • These are applied in case the data dimension is different from the basic block dimension
                        1. data > basic block
                          1. ECB
                            1. CBC
                              1. IGE
                                1. CTS

                                  Annotations:

                                  • This not uses padding and does not send more that than necessary
                                  1. Padding
                                  2. data < basic block
                                    1. CFB
                                      1. OFB
                                        1. CTR
                                    2. Stream Algorithms

                                      Annotations:

                                      • Able to work on stream of data, 1 bit or byte at time.
                                      1. RC4
                                        1. SEAL
                                          1. Key stream
                                            1. pseudo-random key
                                              1. one-time pad
                                          Show full summary Hide full summary

                                          Similar

                                          Cryptography
                                          Cher Bachar
                                          SYMMETRIC ENCRYPTION
                                          Bhagya Prasad
                                          PUBLIC KEY ENCRYPTION
                                          Bhagya Prasad
                                          Security+ Cryptography
                                          Lyndsay Badding
                                          Cipher
                                          Aina Syazwani
                                          Introduction to Cryptography, Lecture 1
                                          Jörg Schwartz
                                          Ciphers
                                          Abraham Nwokolo
                                          Ciphers
                                          Abraham Nwokolo
                                          PUBLIC KEY ENCRYPTION
                                          Bhagya Prasad
                                          Epithelial tissue
                                          Morgan Morgan
                                          Of Mice and Men - Themes
                                          Hafsa A