Hybrid cryptosystem/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: Creating Related Articles subpage) |
No edit summary |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | <noinclude>{{subpages}}</noinclude> | ||
==Parent topics== | ==Parent topics== | ||
Line 24: | Line 24: | ||
{{r|Symmetric key cryptography}} | {{r|Symmetric key cryptography}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Digital signature}} | |||
{{r|Active attack}} | |||
{{r|Diffie-Hellman}} | |||
{{r|SU-8}} | |||
{{r|Satellite communications}} |
Latest revision as of 11:00, 30 August 2024
- See also changes related to Hybrid cryptosystem, or pages that link to Hybrid cryptosystem or to this page or whose text contains "Hybrid cryptosystem".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Hybrid cryptosystem. Needs checking by a human.
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
- Block cipher modes of operation [r]: Methods of combining multiple block cipher operations to achieve a larger goal. [e]
- Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- SU-8 [r]: Commonly used viscous epoxy-based negative photoresist polymer, which can be spun or spread over a thickness ranging from 1 micrometer up to 2 millimeters and still be processed with standard contact lithography. [e]
- Satellite communications [r]: Telecommunications that makes use of a high-altitude relay(s), usually artificial satellites in Earth orbits but potentially a relay in the atmosphere [e]