Cryptography
Encryption is the process of hiding sensitive information.
General Terms:
Name of term | Description of term |
---|---|
Cipher | Encryption and decryption algorithm. |
Clear text / plaintext | Unencrypted data |
Cipher text | Encrypted data |
Encryption Algorithms:
Name of term | Description of term |
---|---|
DES (Data Encryption Standard) | Block cipher, 56-bit key, 64-bit block size |
3DES (Triple Data Encryption Standard) | Block cipher, 168-bit key |
AES | Iterated block cipher. |
RC (Rivest Cipher) | Symmetric-key algorithm. |
Blowfish | A fast symmetric block cipher, 64-bit block size, 32 to 448 bits key |
Twofish | Symmetric-key block cipher |
RSA (Rivest–Shamir–Adleman) | Achieving strong encryption through the use of two large prime numbers. |
Diffie–Hellman | Used for generating a shared key between two entities over an insecure channel. |
DSA (Digital Signature Algorithm) | Private key tells who signed the message. Public key verifies the digital signature |
Ethical Hacking Cheatsheet
Ethical hacking includes authorized attempts to gain unauthorized access to computer systems, applications, or data. Ethical hacking requires replicating the strategies and behaviors of malicious attackers. This practice helps identify security vulnerabilities, So they can be fixed before malicious attackers can exploit them.