Information about Test

  1. Cryptography

    Cryptography or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"

  2. Public-key cryptography

    Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely,

  3. Salt (cryptography)

    In cryptography, a salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are

  4. Key (cryptography)

    In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms

  5. Quantum cryptography

    Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography

  6. Elliptic-curve cryptography

    Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC

  7. Snake oil (cryptography)

    In cryptography, snake oil is any cryptographic method or product considered to be bogus or fraudulent. The name derives from snake oil, one type of patent

  8. Cryptographic hash function

    A cryptographic hash function (CHF) is a hash function that is suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary

  9. Symmetric-key algorithm

    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext

  10. Padding (cryptography)

    In cryptography, padding is any of a number of distinct practices which all include adding data to the beginning, middle, or end of a message prior to