Glossary of Terms

Symmetric & Asymmetric Encryption

Keyword Definition
AES Advanced Encryption Standard, a widely used symmetric encryption algorithm.
Asymmetric Encryption A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data.
Authentication Verifying the identity of the sender or recipient in asymmetric encryption.
Block Cipher A type of symmetric encryption algorithm that operates on fixed-length blocks of data.
Certificate Authority An entity responsible for issuing digital certificates that validate the ownership of a public key.
Cipher A set of rules or steps used in encryption and decryption processes.
Confidentiality Ensuring that information remains confidential in asymmetric encryption.
Decryption The process of converting ciphertext back into plaintext using a decryption algorithm.
Digital Certificate An electronic document issued by a Certificate Authority that binds a public key to an individual or entity.
Digital Signature A cryptographic technique used to verify the authenticity of digital messages or documents.
Digital Signatures A way to ensure the authenticity of a message sent using asymmetric encryption.
Encryption The process of converting plaintext into ciphertext using an encryption algorithm.
Key A piece of information used in conjunction with an algorithm to encrypt and decrypt data.
Key Exchange The process of securely sharing cryptographic keys between parties to enable secure communication.
Key Pair A set of two complementary cryptographic keys: a public key and a private key.
Non-Repudiation Preventing the sender from denying sending a message in asymmetric encryption.
Private Key A cryptographic key that is kept secret and used for decryption or creating digital signatures.
Public Key A cryptographic key that can be freely distributed and is used for encryption or digital signatures.
RSA Algorithm A popular asymmetric encryption algorithm used for secure communication and data protection.
Revocation The process of invalidating a digital certificate before its expiration date due to compromise or other reasons.
Root Certificate A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.
Secure Communication Communication that is protected from eavesdropping, tampering, or unauthorized access using encryption techniques.
Stream Cipher A type of symmetric encryption algorithm that encrypts data one bit at a time.
Symmetric Encryption A cryptographic technique that uses the same key to encrypt and decrypt data.