Elliptic Curve Cryptography

Elliptic Curve Cryptography (ECC) is a public key encryption method that is based on elliptic curve theory that is used to create faster, smaller, and more efficient cryptographic keys. Historically, …

March 31st, 2020

Steganography

Steganography (pronounced: steh·guh·naa·gruh·fee) is the technique of hiding data secretly within an ordinary, non-secret, file or message in order to avoid detection. The use of steganography can be combined with …

March 30th, 2020

Secure Shell (SSH)

Secure Shell (SSH) is a cryptographic network communications protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network …

February 7th, 2020

Key

A key is the numerical value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. Without a proper key, one would not be able to …

December 26th, 2019

Key Pair

A Key Pair is a public key and its corresponding private key. The purpose of this is to have two mathematically related keys having the property that one key can …

December 22nd, 2019

Plaintext

Plaintext is unencrypted information. Plaintext is the precursor to ciphertext. It is also the output of decrypting of an encrypted message. Related Term: Ciphertext, Cryptography, Encryption Source: CNSSI 4009

December 22nd, 2019

Encryption

Encryption is the process of transforming plaintext into ciphertext. This is done by converting data into an unreadable form using an encryption cipher with variable key lengths. Assuming one is …

December 22nd, 2019

Private Key

A Private Key is a cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm. This is the secret …

December 20th, 2019

Symmetric Cryptography

Symmetric Cryptography is a branch of cryptography in which a cryptographic system or algorithms use the same cryptographic key for both encryption and decryption of ciphertext. The keys may be …

December 18th, 2019

Symmetric Key Encryption

Symmetric Key

A Symmetric Key is a cryptographic key that is used to perform both the cryptographic operation and its inverse, for example to encrypt plaintext and decrypt ciphertext, or create a …

December 18th, 2019