tanszek:oktatas:techcomm:crypography
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:techcomm:crypography [2024/10/07 15:32] โ knehez | tanszek:oktatas:techcomm:crypography [2024/10/07 18:24] (current) โ knehez | ||
---|---|---|---|
Line 1: | Line 1: | ||
[[Cryptography]] | [[Cryptography]] | ||
+ | |||
+ | A field focusing on secure communication, | ||
[[Diffie-Hellman Key Exchange]] | [[Diffie-Hellman Key Exchange]] | ||
+ | |||
+ | A cryptographic protocol that allows two parties to securely create a shared secret key over a public channel, relying on the difficulty of solving discrete logarithms. | ||
[[RSA encryption]] | [[RSA encryption]] | ||
+ | |||
+ | A public-key encryption algorithm where large prime numbers are used to generate keys for secure data transmission. The RSA process involves key generation, encryption, and decryption through modular arithmetic. | ||
[[Breaking RSA]] | [[Breaking RSA]] | ||
+ | |||
+ | Explains the process of breaking RSA encryption by factoring the modulus ๐ into prime numbers ๐ and ๐, revealing the private key. It demonstrates the vulnerability of RSA if large primes can be factored. | ||
[[Digital Signature]] | [[Digital Signature]] | ||
+ | |||
+ | A cryptographic method using asymmetric keys to verify the authenticity and integrity of a document. It ensures authenticity, | ||
[[Hash functions]] | [[Hash functions]] | ||
+ | |||
+ | Special functions producing fixed-length outputs from variable inputs, ensuring properties like pre-image and collision resistance. They are essential for digital signatures, password storage, and data integrity. | ||
[[Digital Signature with Hash code]] | [[Digital Signature with Hash code]] | ||
+ | |||
+ | Combines hashing and encryption, where a documentโs hash is encrypted with a private key to create a signature. The recipient verifies it by comparing the decrypted hash with a computed one, ensuring integrity and authenticity. | ||
+ | |||
+ | [[Public Key Authentication]] | ||
+ | |||
+ | Prevents man-in-the-middle attacks by using a trusted third party, a Certificate Authority (CA), to authenticate public keys. The CA issues a certificate containing the digital signature, ensuring the key's authenticity and integrity. | ||
+ |
tanszek/oktatas/techcomm/crypography.1728315143.txt.gz ยท Last modified: 2024/10/07 15:32 by knehez