Basic Cryptography

Get Started. It's Free
or sign up with your email address
Rocket clouds
Basic Cryptography by Mind Map: Basic Cryptography

1. Defining Cryptography

1.1. What is Cryptography?

1.1.1. Cryptography and Security

1.1.1.1. Cryptography can provide five basic protections:

1.1.1.1.1. Confidentiality

1.1.1.1.2. Integrity

1.1.1.1.3. Availability

1.1.1.1.4. Authenticity

1.1.1.1.5. Nonrepudiation

2. Cryptographic Algorithms

2.1. There are three categories of cryptographic algorithms

2.1.1. Hash

2.1.1.1. Hashed Message Authentication Code (HMAC)

2.1.1.2. Message Digest (MD)

2.1.1.3. Secure Hash Algorithm (SHA)

2.1.1.4. Whirlpool

2.1.1.5. RACE Integrity Primitives Evaluation Message Digest (RIPEMD)

2.1.1.6. Password Hash

2.1.1.6.1. LM (LAN Manager)

2.1.1.6.2. NTLM (New Technology LAN Manager)

2.1.2. Symmetric Encryption aka Private key cryptography

2.1.2.1. Stream Cipher

2.1.2.2. Block Cipher

2.1.2.3. Data Encryption Standard (DES)

2.1.2.4. Triple Data Encryption Standard (3DES)

2.1.2.5. Advanced Encryption Standard (AES)

2.1.2.6. Other Algorithms

2.1.2.6.1. Rivest Cipher

2.1.2.6.2. Blowfish

2.1.3. Asymmetric Encryption aka Public key cryptography

2.1.3.1. RSA

2.1.3.2. Elliptic Curve Cryptography (ECC)

2.1.3.3. Quantum Cryptography

2.1.3.4. NTRUEncrypt

3. Using Cryptography

3.1. Encryption Through Software

3.2. File and File System Cryptography

3.2.1. Prett Good Privacy (PGP)

3.2.2. MS Windows Encrpting File System (EFS)

3.3. Whole Disk Encryption

3.4. Hardware Encryption

3.5. USB Device Encryption

3.6. Hard Disk Drive Encryption

3.7. Trusted Platform Module (TPM)

3.8. Hardware Security Module (HSM)