A tag is a keyword or label that categorizes your question with other, similar questions. Using the right tags makes it easier for others to find and answer your question.
Type to find tags: |
encryption× 460
the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
|
hash× 332
a function which takes a variable size input and produces a fixed size output. The algorithm makes it difficult to predict the output for a given input, find two inpu…
|
rsa× 300
an asymmetric (e.g. public-key) cryptosystem, based on modular exponentiation with big exponents and modulus. RSA can be used both for signature and encryption.
|
aes× 250
(or Advanced Encryption Standard), a symmetrical block-cipher algorithm with a 128-bit block size, and key sizes of 128, 192 or 256 bits.
|
public-key× 249
Public key cryptography describes all cryptographic algorithms which have a pair of keys, one key that performs encryption and one key that performs decryption. One of these keys is made available pub…
|
cryptanalysis× 216
analysing cryptographic algorithms, potentially uncovering weaknesses in them (e.g. "breaking" them or casting doubts on their actual security)
|
block-cipher× 143
an encryption algorithm which encrypts fixed-size blocks of plaintext to same-sized blocks of ciphertext. For good ciphers every bit of the ciphertext block depends on every bit of t…
|
protocol-design× 125
Design of cryptographic protocols, i.e. ways of using algorithms (primitives) to achieve one or more security goals like integrity, confidentiality, authenticity (maybe together with non-security-rela…
|
signature× 123
Algorithms and protocols for creating signatures to documents, and verifying such signatures. These are normally asymmetric, for symmetric signatures see [mac].
|
random-number-generator× 112
creation of (real or pseudo) random numbers (or bits).
|
elliptic-curves× 112
a mathematical structure. In cryptography, it is common to use the structure $y^2 = x^3 + ax^2 + b$ over a finite field. Questions relating to elliptic curves and derived algorithm…
|
passwords× 104
secret keys which human beings can memorize.
|
implementation× 96
the process of taking it from its mathematical or algorithmic description and producing a working version, often in computer software or hardware. This tag should …
|
symmetric× 81
Symmetric cryptosystems assume two communicating entities share a pre-established secret key.
|
diffie-hellman× 78
The most famous key exchange algorithm with perfect forward-secrecy.
|
authentication× 77
successfully validating that an entity you are communicating with is actually who they claim to be. The entity typically demonstrates who they are by showing they possess a secret th…
|
keys× 76
usually secret information used as input to various kinds of cryptographic algorithms, like encryption, signature, MAC, to select the concrete transformation done by the algorithm.
|
mac× 71
(or message authentication code), a short piece of information used to authenticate a message, and the algorithm to create and check such information, using a secret key.
|
modes-of-operation× 70
ways of transforming a block cipher to a stream cipher, enabling repeated use without changing the key.
|
stream-cipher× 67
an encryption algorithm which encrypts arbitrary length plain text, using a (fixed length) key. Some stream ciphers generate a key stream from only the key, which is then XOR-combin…
|
key-exchange× 67
Key exchange protocols allow two parties to produce a secret session key over a public channel.
|
initialization-vector× 65
Random data used by block cipher modes of operation to randomize the output in order to achieve semantic security. Also for other similar constructs in other iterative algorithms.
|
algorithm-design× 65
Design of cryptographic primitives (algorithms), like block ciphers, stream ciphers, random-number generators, hash functions, MACs, key exchanges, public-key encryption or signature schemes. Also tag…
|
cbc× 65
a method for encrypting large amounts of data with a block cipher that can only encrypt fixed length plaintexts. When used with an unpredictable initialization vector (I…
|
key-derivation× 63
In cryptography, a key derivation function (or KDF) derives one or more secret keys from a secret value such as a master key or other known information such as a password or passphrase using a pseudo-…
|
homomorphic-encryption× 62
Cryptosystems which support computation on encrypted data. They might be partially homomorphic (support for one operation such as + or *) or they might be fully homomorphic (+ and * at the same time).
|
hmac× 60
a method for constructing a message authentication code based on a cryptographic hash function.
|
hash-collision× 59
any pair of values (preimages) that when hashed produce the same digest (image). Finding even one example of a collision should be infeasible in a cryptographically secure hash fun…
|
brute-force-attack× 59
attempting to find a secret value by trying all possible values until the correct one is found.
|
discrete-logarithm× 58
the number of times a generator of a group must be multiplied by itself to produce a known number. By choosing certain groups, the task of finding a discrete l…
|
ssl× 58
SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are protocols which provide communication security (privacy and integrity) for a bidirectional data channel.
|
provable-security× 57
A primitive or protocol with provable security is accompanied by a mathematical proof that shows how to reduce the security claims about the protocol to a set of assumptions.
|
number-theory× 53
the study of the properties and construction of numbers, particularly integers. Prime numbers are of particular interest to number theorists and consequently cryptographers as they ar…
|
elgamal× 51
a public key encryption scheme and signature scheme with security based on the discrete logarithm problem.
|
prime-numbers× 50
an integer greater than 1 with no divisors other than itself and 1. Primes and prime products play an important role in public key cryptography.
|
authenticated-encryption× 49
Combination of encryption and authentication in a way that ensures confidentiality and integrity.
|