User Tools

Site Tools


tanszek:oktatas:techcomm:crypography

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tanszek:oktatas:techcomm:crypography [2024/10/07 13:34] kneheztanszek:oktatas:techcomm:crypography [2024/10/07 18:24] (current) knehez
Line 1: Line 1:
 [[Cryptography]] [[Cryptography]]
 +
 +A field focusing on secure communication, ensuring confidentiality, authenticity, and data integrity. Methods like AES, RSA, and digital signatures are used to encrypt data, authenticate users, and detect tampering
  
 [[Diffie-Hellman Key Exchange]] [[Diffie-Hellman Key Exchange]]
 +
 +A cryptographic protocol that allows two parties to securely create a shared secret key over a public channel, relying on the difficulty of solving discrete logarithms. 
  
 [[RSA encryption]] [[RSA encryption]]
 +
 +A public-key encryption algorithm where large prime numbers are used to generate keys for secure data transmission. The RSA process involves key generation, encryption, and decryption through modular arithmetic.
  
 [[Breaking RSA]] [[Breaking RSA]]
 +
 +Explains the process of breaking RSA encryption by factoring the modulus 𝑁 into prime numbers 𝑝 and 𝑞, revealing the private key. It demonstrates the vulnerability of RSA if large primes can be factored.
 +
 +[[Digital Signature]]
 +
 +A cryptographic method using asymmetric keys to verify the authenticity and integrity of a document. It ensures authenticity, non-repudiation, and that the document has not been tampered with. RSA is one simple method used for digital signatures.
 +
 +[[Hash functions]]
 +
 +Special functions producing fixed-length outputs from variable inputs, ensuring properties like pre-image and collision resistance. They are essential for digital signatures, password storage, and data integrity.
 +
 +[[Digital Signature with Hash code]]
 +
 +Combines hashing and encryption, where a document’s hash is encrypted with a private key to create a signature. The recipient verifies it by comparing the decrypted hash with a computed one, ensuring integrity and authenticity.
 +
 +[[Public Key Authentication]]
 +
 +Prevents man-in-the-middle attacks by using a trusted third party, a Certificate Authority (CA), to authenticate public keys. The CA issues a certificate containing the digital signature, ensuring the key's authenticity and integrity.
 +
tanszek/oktatas/techcomm/crypography.1728308096.txt.gz · Last modified: 2024/10/07 13:34 by knehez