Symmetric Encryption Key
Cipher Block Cipher
Stream Cipher Encryption
Decryption AES

 

A piece of information used in conjunction with an algorithm to encrypt and decrypt data. A cryptographic technique that uses the same key to encrypt and decrypt data.
A type of symmetric encryption algorithm that operates on fixed-length blocks of data. A set of rules or steps used in encryption and decryption processes.
The process of converting plaintext into ciphertext using an encryption algorithm. A type of symmetric encryption algorithm that encrypts data one bit at a time.
Advanced Encryption Standard, a widely used symmetric encryption algorithm. The process of converting ciphertext back into plaintext using a decryption algorithm.

 

Asymmetric Encryption Key Pair
RSA Algorithm Digital Signature
Key Exchange Secure Communication
Digital Signatures Authentication

 

A set of two complementary cryptographic keys: a public key and a private key. A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data.
A cryptographic technique used to verify the authenticity of digital messages or documents. A popular asymmetric encryption algorithm used for secure communication and data protection.
Communication that is protected from eavesdropping, tampering, or unauthorized access using encryption techniques. The process of securely sharing cryptographic keys between parties to enable secure communication.
Verifying the identity of the sender or recipient in asymmetric encryption. A way to ensure the authenticity of a message sent using asymmetric encryption.

 

Confidentiality Non-Repudiation
Certificate Authority Digital Certificate
Public Key Private Key
Root Certificate Revocation

 

Preventing the sender from denying sending a message in asymmetric encryption. Ensuring that information remains confidential in asymmetric encryption.
An electronic document issued by a Certificate Authority that binds a public key to an individual or entity. An entity responsible for issuing digital certificates that validate the ownership of a public key.
A cryptographic key that is kept secret and used for decryption or creating digital signatures. A cryptographic key that can be freely distributed and is used for encryption or digital signatures.
The process of invalidating a digital certificate before its expiration date due to compromise or other reasons. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.