AES |
Advanced Encryption Standard, a widely used symmetric encryption algorithm. |
Asymmetric Encryption |
A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data. |
Authentication |
Verifying the identity of the sender or recipient in asymmetric encryption. |
Block Cipher |
A type of symmetric encryption algorithm that operates on fixed-length blocks of data. |
Certificate Authority |
An entity responsible for issuing digital certificates that validate the ownership of a public key. |
Cipher |
A set of rules or steps used in encryption and decryption processes. |
Confidentiality |
Ensuring that information remains confidential in asymmetric encryption. |
Decryption |
The process of converting ciphertext back into plaintext using a decryption algorithm. |
Digital Certificate |
An electronic document issued by a Certificate Authority that binds a public key to an individual or entity. |
Digital Signature |
A cryptographic technique used to verify the authenticity of digital messages or documents. |
Digital Signatures |
A way to ensure the authenticity of a message sent using asymmetric encryption. |
Encryption |
The process of converting plaintext into ciphertext using an encryption algorithm. |
Key |
A piece of information used in conjunction with an algorithm to encrypt and decrypt data. |
Key Exchange |
The process of securely sharing cryptographic keys between parties to enable secure communication. |
Key Pair |
A set of two complementary cryptographic keys: a public key and a private key. |
Non-Repudiation |
Preventing the sender from denying sending a message in asymmetric encryption. |
Private Key |
A cryptographic key that is kept secret and used for decryption or creating digital signatures. |
Public Key |
A cryptographic key that can be freely distributed and is used for encryption or digital signatures. |
RSA Algorithm |
A popular asymmetric encryption algorithm used for secure communication and data protection. |
Revocation |
The process of invalidating a digital certificate before its expiration date due to compromise or other reasons. |
Root Certificate |
A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain. |
Secure Communication |
Communication that is protected from eavesdropping, tampering, or unauthorized access using encryption techniques. |
Stream Cipher |
A type of symmetric encryption algorithm that encrypts data one bit at a time. |
Symmetric Encryption |
A cryptographic technique that uses the same key to encrypt and decrypt data. |