Lecture 6: Cryptography
Terms and concepts you should know
Paul Krzyzanowski
October 16, 2020
- Shared symmetric keys
- Trapdoor function
- Public-key algorithm
- Asymmetric cryptography
- Public key
- Private key
- Factoring
- Discrete logarithms
- RSA (what it does & what it’s based on)
- ECC (what it does & what it’s based on)
- Why longer keys?
- Communication with public-key algorithms
- Diffie-Hellman Key Exchange
- Hybrid cryptosystem
- Forward secrecy
- Session key
- Ephemeral key
- Quantum computing threat
- One-way function
- Cryptographic hash function
- Pre-image resistance
- Collision resistance
- Weak vs. strong collision resistance
- Diffusion
- Message digest
- SHA–1, SHA–2 (–256, –512), SHA–3
- Pigeonhole principle
- Birthday paradox
- Message authentication code (MAC)
- HMAC
- CBC-MAC
- Digital signature
- Signing
- Verification
- Anonymous identities
- Digital certificates (X.509)
- Certification Authority (CA)
- Per-page hashes in signed software