The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)
One key encrypts, a different key decrypts.
Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2
A method in cryptography by which keys (public or private) are exchanged between two parties.
One of the first asymmetric key implementations and was responsible for securing the exchange of keys.
Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.
The first widely used asymmetric algorithm used for both signing and encryption.
The output from any input that has been processed through a hashing algorithm / function.
The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message’s contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no “keys” in hashing functions.
whenever 2 inputs map to the same output.
whenever you can work backwards through an algorithm (like a Caesar cipher)
A small data file that digitally binds a public cryptographic key to an organization.
Will secure one domain or subdomain.
Will secure one domain and an unlimited number of its subdomains.
Will secure multiple domains.
Belongs to the Certificate Authority.
Acts as a “middle-man” between the root certificate and the server certificate.
Issued to the domain.
Allows a server to validate their own SSL certificate by bundling a time-stamped response signed by the certificate authority.
The process of associating a host with their expected certificate or public key.