Basic Cryptography

Get Started. It's Free
or sign up with your email address
Rocket clouds
Basic Cryptography by Mind Map: Basic Cryptography

1. Defining Cryptography

1.1. What is Cryptography?

1.1.1. Cryptography and Security Cryptography can provide five basic protections: Confidentiality Integrity Availability Authenticity Nonrepudiation

2. Cryptographic Algorithms

2.1. There are three categories of cryptographic algorithms

2.1.1. Hash Hashed Message Authentication Code (HMAC) Message Digest (MD) Secure Hash Algorithm (SHA) Whirlpool RACE Integrity Primitives Evaluation Message Digest (RIPEMD) Password Hash LM (LAN Manager) NTLM (New Technology LAN Manager)

2.1.2. Symmetric Encryption aka Private key cryptography Stream Cipher Block Cipher Data Encryption Standard (DES) Triple Data Encryption Standard (3DES) Advanced Encryption Standard (AES) Other Algorithms Rivest Cipher Blowfish

2.1.3. Asymmetric Encryption aka Public key cryptography RSA Elliptic Curve Cryptography (ECC) Quantum Cryptography NTRUEncrypt

3. Using Cryptography

3.1. Encryption Through Software

3.2. File and File System Cryptography

3.2.1. Prett Good Privacy (PGP)

3.2.2. MS Windows Encrpting File System (EFS)

3.3. Whole Disk Encryption

3.4. Hardware Encryption

3.5. USB Device Encryption

3.6. Hard Disk Drive Encryption

3.7. Trusted Platform Module (TPM)

3.8. Hardware Security Module (HSM)