Symmetric Encryption | Key |
Cipher | Block Cipher |
Stream Cipher | Encryption |
Decryption | AES |
A piece of information used in conjunction with an algorithm to encrypt and decrypt data. | A cryptographic technique that uses the same key to encrypt and decrypt data. |
A type of symmetric encryption algorithm that operates on fixed-length blocks of data. | A set of rules or steps used in encryption and decryption processes. |
The process of converting plaintext into ciphertext using an encryption algorithm. | A type of symmetric encryption algorithm that encrypts data one bit at a time. |
Advanced Encryption Standard, a widely used symmetric encryption algorithm. | The process of converting ciphertext back into plaintext using a decryption algorithm. |
Asymmetric Encryption | Key Pair |
RSA Algorithm | Digital Signature |
Key Exchange | Secure Communication |
Digital Signatures | Authentication |
A set of two complementary cryptographic keys: a public key and a private key. | A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data. |
A cryptographic technique used to verify the authenticity of digital messages or documents. | A popular asymmetric encryption algorithm used for secure communication and data protection. |
Communication that is protected from eavesdropping, tampering, or unauthorized access using encryption techniques. | The process of securely sharing cryptographic keys between parties to enable secure communication. |
Verifying the identity of the sender or recipient in asymmetric encryption. | A way to ensure the authenticity of a message sent using asymmetric encryption. |
Confidentiality | Non-Repudiation |
Certificate Authority | Digital Certificate |
Public Key | Private Key |
Root Certificate | Revocation |
Preventing the sender from denying sending a message in asymmetric encryption. | Ensuring that information remains confidential in asymmetric encryption. |
An electronic document issued by a Certificate Authority that binds a public key to an individual or entity. | An entity responsible for issuing digital certificates that validate the ownership of a public key. |
A cryptographic key that is kept secret and used for decryption or creating digital signatures. | A cryptographic key that can be freely distributed and is used for encryption or digital signatures. |
The process of invalidating a digital certificate before its expiration date due to compromise or other reasons. | A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain. |