-
RSA
- A public key cryptography algorithm developed by Rivest Shamir and Adleman. Commonly used in e-commerce.
-
RSA public and private key usage:
-
Send an encrypted message:
- Uses the receiver's public key
-
Decrypt an encrypted message:
- Uses the receiver's private key
-
Send an encrypted signature:
- Uses the sender's private key
-
Decrypt an encrypted signature:
- Uses the sender's public key
-
Diffie-Hellman
- Invented in the 1970s, the first practical method for establishing a shared secret key over an unprotected communications channel.
-
Elliptic Curve
-
Elliptic Curve Cryptography (ECC):
- A type of public key cryptography based on the structure of an elliptic curve.
-
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE):
- An asymmetric algorithm created by Diffie and Hellman that is based on elliptic curve cryptography and runs in ephemeral mode.
-
Other
-
One-Time Pad (OTP)
- A cipher that encrypts plaintext with a secret random key that is the same length as the plaintext.
-
PGP
-
Pretty Good Privacy (PGP):
- An encryption program used primarily for signing, encrypting, and decrypting e-mails in an attempt to increase the security of e-mail communications.
-
GNU Privacy Guard (GPG):
- A free alternative to PGP that is compliant with OpenPGP.
-
Pseudorandom Number Generators
-
Pseudorandom Number Generator (PRNG):
- Used by cryptographic applications that require unpredictable output.
-
Example:
- SHA2PRNG
-
Threat:
- RNG Attack
-
Prevention:
- Additional randomness, AES, SHA256 or higher, and physical control of the system.